At present, identity theft is one of the most prevalent security threats. Authentication is an inevitable process of ver......more
...more
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more
The Web Hosting Manager is a one-stop business guide when starting a new web hosting business or when you need to jumps......more
There’s a storm brewing, and your business is right in its path! Despite all of the time and money you invested in your ......more
It takes more than one source of study material to prepare for the Security+ exam, but who has time to read through two ......more
...more
"Clicks and Mortar" - Jetzt neu als Broschurausgabe! Dieses Buch ermöglicht einen faszinierenden Blick hinter die Kuliss......more
...more
...more
★★★ Unlock the power of Pixel ★★★ Google has been in a race to build the best smartphone for years. In 2020, Google step......more
...more
...more
Deploy your own private mobile network with OpenBTS, the open source software project that converts between the GSM and ......more
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. Thi......more
Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wi......more
What exactly is virtualization? As this concise book explains, virtualization is a smorgasbord of technologies that offe......more
This report presents a framework for the development of metrics--and a method for scoring them--that indicates how well ......more
A cybersecurity expert and former Google privacy analyst s urgent call to protect devices and networks against malicious......more
The challenge of securing U.S. Department of Defense (DoD) information systems has grown significantly. A new approach t......more
The Internet has changed our social spaces, our political and social realities, our use of language, and the way we comm......more
Hast du dich schon selbst gegoogelt? Bist du zufrieden mit deinen Suchergebnissen? Vor Bewerbungsgespr chen oder dem ers......more
...more
A highly mathematical investigation of the mathematical underpinnings of the attention economy. Valuable reading for any......more
If you want to PASS the CompTIA Network+ Certification, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! I......more
This book introduces electrical machine modeling and control for electrical engineering and science to graduate, undergr......more
...more
This book is the full three volumes of the successful, and well-reviewed, e-book series of the same name, re-published f......more
...more
Children today are digital natives, growing up in an age where social media and online communication is the norm. This b......more
...more
...more
...more
’HyperReality is a technological capability like nanotechnology, human cloning and artificial intelligence. Like them, i......more
"Mastering the Maze: Navigate to Success with Google Ads" is your ultimate guide to harnessing the power of Google Ads t......more
...more
A unique and highly controversial defense of the possibilities in our new technologies to expand our idea of what is rea......more
Luiz Augusto de Carvalho - WANOPT Wide area network Specialist Benjamin Naude - Magna international Telecommunications ......more
As the authors of the popular book eBay PowerSeller Secrets, Debra and Brad Schepp are experts at making big money selli......more
"Tech Horizons: Unveiling Tomorrow’s Innovations" acts as a visionary guide to the cutting edge of tomorrow’s technologi......more
In the immersive realm of digital worlds and interactive entertainment, where reality seamlessly merges with the virtual......more
As the use of Software Defined Networking (SDN) becomes increasingly prevalent, securing these dynamic and programmable ......more
Don’t let artificial intelligence and robots steal your job! Still Room for Humans is the only survival guide you need i......more
Internet of Vehicles (IoV) is an emerging concept in Intelligent Transportation Systems (ITS) to enhance the existing ca......more
Network coding existed for a very long time. It provides efficient techniques to enhance the efficiency of a network. Fu......more
Learn the ins and outs of the IT security field and efficiently prepare for the CompTIA Security+ Exam SY0-601 with one ......more
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester ......more
Digital transformation is no longer news--it’s a necessity. Despite the widespread threat of disruption, many large comp......more
Affiliate marketing is hot; here s how to get your program going Nearly every retailer in the Internet Retailers Top 50......more
If you ve been charged with setting up storage area networks for your company, learning how SANs work and managing data ......more
Virtualization has become a megatrend --and for good reason. Implementing virtualization allows for more efficient util......more
Das Internet ist allgegenwärtig. Sein Einflu und seine Macht erstreckt sich bis in jeden Winkel unseres Berufs- und Priv......more
Tuition costs across the country are rising at an alarming rate--and financial aid is harder to get than ever. Parents a......more
Windows Home Server brings the idea of centralized storage, backup and computer management out of the enterprise and int......more
You could think of Setting Up LAMP as four books in one, but it s actually something much more valuable: a single volume......more
"DNS For Dummies" ist ein einzigartiger Leitfaden zu DNS für Einsteiger. DNS - Domain Name System - übersetzt Internet H......more
Let s face it: the information age makes dummies of us all at some point. One thing we can say for sure, though, about t......more
...more
In this book we analyze the topic of Intellectual Property Rights (IPR) from a new perspective. The topic of restriction......more
...more
Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How Wor......more
With the threats that affect every computer, phone or other device connected to the internet, security has become a resp......more
A well written guide by an accomplished and certified PMP project manager, expert and books author. PMP certification bo......more
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authentic......more
The authors document the history of the Third Offset, a U.S. strategy that focused on the potential of technology to off......more
The U.S. Air Force asked RAND Project AIR FORCE to determine where it is most fruitful to focus effort in making changes......more
...more
Working remotely allows us to have more control over our time and organize it in a way that works for us personally. We ......more
What are the attitudes and actions that make great principals stand out? In this internationally renowned bestseller, To......more
**UPDATED FOR 2024** With everything being online these days it only makes sense that we are starting to use online appl......more
This seo guide will show beginners the necessities to properly organize their website content, show you proper seo strat......more
In today’s digital age, the collection and sharing of personal health information have become a significant concern for ......more
In today’s digital age, technology has become an integral part of our lives. From smartphones to computers, we rely on t......more
The past decade has seen phenomenal growth in the development and use of virtual worlds. In one of the most notable, Sec......more
Understanding the Basics of HackingIn today’s digital age, it is crucial for students to be aware of the basics of hacki......more
This volume covers the key concepts and technologies of Local Area Networking in 100 three- to five-page articles, heavi......more
This volume introduces the reader to Weblog technology and aims to help him/her choose and implement a Weblog site. It p......more
The aim of this guide is to enable beginners to gain an understanding of core VisualBasic and JScript programming concep......more
The Evolution of Education in the Digital AgeIn today’s fast-paced, technology-driven world, the internet has become an ......more
...more
Pub_AbstractText: The impetus for this study was the need to gain a better understanding of what interaction activities ......more
Corporations, governments, private people, healthcare, and educational institutions are all vulnerable to cyberattacks. ......more
How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks ......more
...more
Bringing the Internet to School presents the results of one of the first comprehensive studies of Internet-implementatio......more