Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the...
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the...
For People Who Create And Modify Text Files, Sed And Awk Are Power Tools For Editing. Sed, Awk, And Regular Expressions Allow Programmers And System...
For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system...
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced...
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administratorsand not without reason. sendmail configuration languages are...
As a student and parttime bartender in Manhattan, Tessa Hart has found that a succession of roomies and cramped apartments are necessary evils in her...
If You Are A Network Administrator, You'Re Under A Lot Of Pressure To Ensure That Missioncritical Systems Are Completely Safe From Malicious Code, Buffer Overflows,...
This book demonstrates serviceoriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling...
This book demonstrates serviceoriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling...
Are you serious about network security? Then check out SSH, the Secure Shell, which provides keybased authentication and transparent encryption for your network connections. It's...
Are you serious about network security? Then check out SSH, the Secure Shell, which provides keybased authentication and transparent encryption for your network connections. It's...
At a time when women were effectively silenced in church, St Teresa of vila (151582) represents an extraordinary exception. Early struggles with her spiritual advisers...
Strategic Reading Second edition is a threelevel series designed to develop reading, fluency, vocabularybuilding, and criticalthinking skills. The Teacher's Manual provides an overview of the...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":false,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="4075c2a184e5d53d376887c0d8283367" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the...
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the...
For People Who Create And Modify Text Files, Sed And Awk Are Power Tools For Editing. Sed, Awk, And Regular Expressions Allow Programmers And System...
For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system...
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced...
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administratorsand not without reason. sendmail configuration languages are...
As a student and parttime bartender in Manhattan, Tessa Hart has found that a succession of roomies and cramped apartments are necessary evils in her...
If You Are A Network Administrator, You'Re Under A Lot Of Pressure To Ensure That Missioncritical Systems Are Completely Safe From Malicious Code, Buffer Overflows,...
This book demonstrates serviceoriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling...
This book demonstrates serviceoriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling...
Are you serious about network security? Then check out SSH, the Secure Shell, which provides keybased authentication and transparent encryption for your network connections. It's...
Are you serious about network security? Then check out SSH, the Secure Shell, which provides keybased authentication and transparent encryption for your network connections. It's...
At a time when women were effectively silenced in church, St Teresa of vila (151582) represents an extraordinary exception. Early struggles with her spiritual advisers...
Strategic Reading Second edition is a threelevel series designed to develop reading, fluency, vocabularybuilding, and criticalthinking skills. The Teacher's Manual provides an overview of the...
Sale price$28.77Regular price$43.16
Quantity
Add to cart
Choosing a selection results in a full page refresh.