Ask our staff anything about our shop or products, or leave your feedback.
IP Multicast Volume I: Cisco IP Multicast Networking
Design, deploy, and operate modern Cisco IP multicast networks
IP Multicast, Volume I thoroughly covers basic IP ...
The IKEv2 protocol significantly improves VPN security, and Cisco's FlexVPN offers a unified paradigm and command line interface for taking full advantage of it ...
Learn all the ins and outs of SharePoint 2016, launch your site, collaborate with coworkers, and go mobile There's no doubt about it, SharePoint ...
Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering ...
Combines the popular Sybex CEH v9: Certified Ethical Hacker Version 9 Study Guide ISBN 978-1-119-25224-5 updated for the CEH v9 exam with the all new ...
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to ...
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and ...
Microservice-based applications enable unprecedented agility and ease of management, and Docker containers are ideal for building them. Microsoft Azure offers all the foundational technology and ...
This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry ...
Technologies and Control Technologies and Control
Microsoft Azure Service Fabric makes it easier than ever before to build large-scale distributed cloud applications. You can quickly develop and update microservice-based applications, efficiently ...
VCP6-DCV Official Cert Guide presents you with an organised test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already ...
The #1 bestselling beginner's guide to computer networking?now in a new edition
Need networking know-how, but don't know where to turn? Run ...
The authors begin with a high-level overview of the Internet of Things (IoT) and introduce key concepts needed to successfully design IoT solutions. Next, they ...
Master CEH v9 and identify your weak spots
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five ...