Operators are introducing mobile television and digital video content services globally. The Handbook of Mobile Broadcasting addresses all aspects of these services, providing a comprehensive...
As Webbased systems and ecommerce carry businesses into the 21st century, databases are becoming workhorses that shoulder each and every online transaction. For organizations to...
Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is...
Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is...
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An...
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides highspeed, highbandwidth efficiency and highcapacity multimedia services for both...
Metro Service Providers are increasingly turning to MultiProtocol Label Switching (MPLS) to converge disparate networks and services into a unified core, maintain quality, and deliver...
As the recognized leader in the field of information security education and certification, the (ISC)2 promotes the development of information security professionals around the world....
Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages...
Not connecting software project management (SPM) to actual, realworld development processes can lead to a complete divorcing of SPM to software engineering that can undermine...
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations...
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the...
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server...
This singlevolume desktop reference provides comprehensive information on all server issues featuring contributions from experts in the field. Engineers for system vendors, systems integrators, major...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":false,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="a282c51461c13df9cf08866077d48f08" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
Operators are introducing mobile television and digital video content services globally. The Handbook of Mobile Broadcasting addresses all aspects of these services, providing a comprehensive...
As Webbased systems and ecommerce carry businesses into the 21st century, databases are becoming workhorses that shoulder each and every online transaction. For organizations to...
Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is...
Information Security Policies and Procedures: A Practitioners Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is...
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An...
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides highspeed, highbandwidth efficiency and highcapacity multimedia services for both...
Metro Service Providers are increasingly turning to MultiProtocol Label Switching (MPLS) to converge disparate networks and services into a unified core, maintain quality, and deliver...
As the recognized leader in the field of information security education and certification, the (ISC)2 promotes the development of information security professionals around the world....
Until now, developers and researchers interested in the design, operation, and performance of Bluetooth networks have lacked guidance about potential answers and the relative advantages...
Not connecting software project management (SPM) to actual, realworld development processes can lead to a complete divorcing of SPM to software engineering that can undermine...
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations...
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the...
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server...
This singlevolume desktop reference provides comprehensive information on all server issues featuring contributions from experts in the field. Engineers for system vendors, systems integrators, major...