Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of...
The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies;...
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks...
Thor's Microsoft Security Bible provides a onestopshop for Microsoftrelated security techniques and procedures as applied to the typical deployment of a Microsoftbased infrastructure. Written by...
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and...
Violent Python Shows You How To Move From A Theoretical Understanding Of Offensive Computing Concepts To A Practical Implementation. Instead Of Relying On Another Attackers...
Wireless Networking Has Become Standard In Many Business And Government Networks. This Book Is The First Book That Focuses On The Methods Used By Professionals...
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals...
Windows Forensic Analysis Dvd Toolkit, Second Edition, Is A Completely Updated And Expanded Version Of Harlan Carvey'S Bestselling Forensics Book On Incident Response And Investigating...
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 provides an overview of live and postmortem response collection and analysis methodologies for Windows 7....
Harlan Carvey Has Updated Windows Forensic Analysis Toolkit, Now In Its Fourth Edition, To Cover Windows 8 Systems. The Primary Focus Of This Edition Is...
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is...
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most indepth guide to forensic investigations involving Windows Registry. This...
Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":null,"requiresBillingAgreement":false,"merchantId":"TFGLCKQ7YEVTA","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AfUEYT7nO4BwZQERn9Vym5TbHAG08ptiKa9gm8OARBYgoqiAJIjllRjeIMI4g294KAH1JdTnkzubt1fr\u0026merchant-id=TFGLCKQ7YEVTA\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="5cbd526cbfd8e0ce8e945dcd4d09413c" enabled-flags="["1b55bc27","2d75a54c"]" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of...
The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies;...
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks...
Thor's Microsoft Security Bible provides a onestopshop for Microsoftrelated security techniques and procedures as applied to the typical deployment of a Microsoftbased infrastructure. Written by...
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and...
Violent Python Shows You How To Move From A Theoretical Understanding Of Offensive Computing Concepts To A Practical Implementation. Instead Of Relying On Another Attackers...
Wireless Networking Has Become Standard In Many Business And Government Networks. This Book Is The First Book That Focuses On The Methods Used By Professionals...
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals...
Windows Forensic Analysis Dvd Toolkit, Second Edition, Is A Completely Updated And Expanded Version Of Harlan Carvey'S Bestselling Forensics Book On Incident Response And Investigating...
Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 provides an overview of live and postmortem response collection and analysis methodologies for Windows 7....
Harlan Carvey Has Updated Windows Forensic Analysis Toolkit, Now In Its Fourth Edition, To Cover Windows 8 Systems. The Primary Focus Of This Edition Is...
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is...
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most indepth guide to forensic investigations involving Windows Registry. This...
Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to...
Sale price$76.80Regular price$109.71
Quantity
Add to cart
Recently viewed products
Choosing a selection results in a full page refresh.