0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (28)
  • -
Status
Brand

Showing 1 - 25 of 30 matches in All Departments

10 Cool Lego Mindstorm Robotics Invention System 2 Projects - Amazing Projects You Can Build in Under an Hour (Paperback):... 10 Cool Lego Mindstorm Robotics Invention System 2 Projects - Amazing Projects You Can Build in Under an Hour (Paperback)
Syngress
R615 R540 Discovery Miles 5 400 Save R75 (12%) Ships in 12 - 17 working days

LEGO MINDSTORMS lets you design and program robots that can do just about anything
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of all ages.
10 Cool LEGO MINDSTORMS RIS 2.0 Projects: Amazing Projects You Can Build in Under an Hour provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies.
From out of the box to up and running in less than an hour.
8-page color insert. A color insert illustrates the complete projects in full-detail.
Specifically targeted at new users of the LEGO MINDSTORMS RIS 2.0.

Firewall Policies and VPN Configurations (Paperback): Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh,... Firewall Policies and VPN Configurations (Paperback)
Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, …
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.
This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
. The only book that focuses on creating policies that apply to multiple products.
. Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand"

Check Point Next Generation with Application Intelligence Security Administration (Paperback): Syngress Check Point Next Generation with Application Intelligence Security Administration (Paperback)
Syngress
R2,173 Discovery Miles 21 730 Ships in 10 - 15 working days

This book focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check Point NG. Like Check Point NG Security Administration, this book provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. Readers can learn how to use all of these products to create a secure network with virtual private networking features. Security professionals will buy, read, and keep this book because it will cover all features of Check Point NG FP 4 like no other book will.
- Covers all products, upgrades, and enhancements contained in FP 4 including: SMART, SecurePlatform, SecureXL, ClusterXL, and Performance Pack
- Covers all objectives on Check Point's CCSA exam, and readers will be able to download a free exam simulator from syngress.com.
- Check Point continues to dominate the Firewall space owning over 65% of the worldwide Firewall market. Syngress' book on the first version of Check Point NG continues to be the market leading Check Point book.

Security Assessment - Case Studies for Implementing the NSA IAM (Paperback): Syngress Security Assessment - Case Studies for Implementing the NSA IAM (Paperback)
Syngress
R2,457 Discovery Miles 24 570 Ships in 10 - 15 working days

The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.
This book also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).
The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.
- Everything You Need to Know to Conduct a Security Audit of Your Organization
- Step-by-Step Instructions for Implementing the National Security Agency's Guidelines
- Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more

Rick Gallaher's MPLS Training Guide - Building Multi Protocol Label Switching Networks (Paperback): Syngress Rick Gallaher's MPLS Training Guide - Building Multi Protocol Label Switching Networks (Paperback)
Syngress
R1,980 Discovery Miles 19 800 Ships in 10 - 15 working days

This book introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting.
It discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, traffic engineering, mpls vpns, mpls vpn deployment models, mpls vpn routing protocol support, multi-protocol bgp, mpls vpn configurations, mpls vpn integration, and mpls vpn management.
Readers will find complete ready-to-use configurations for routers
Shows how to implement MPLS traffic engineering on a core network and optimize traffic
Great for users studying for Cisco's Implementing Cisco MPLS exam, 640-910 and written by a Cisco internetworking expert who knows everything about MPLS.
Includes coverage of Cisco Systems' newly released (October 7, 2002) Multiprotocol Label Switching (MPLS) Bandwidth Protection software package. The new architecture uses MPLS Traffic Engineering Fast Reroute and an offline application called Tunnel Builder Pro to increase resiliency at a network-wide level.
Includes updated coverage of MPLS and GMPLS

The Best Damn Cisco Internetworking Book Period (Paperback): Syngress The Best Damn Cisco Internetworking Book Period (Paperback)
Syngress
R2,472 Discovery Miles 24 720 Ships in 10 - 15 working days

The Best Damn Cisco Internetworking Book Period shows readers everything they need to know about all Cisco internetworking topics. The book provides an understanding of Cisco's current VoIP solutions and the means to put them to work, showing how to configure all of Cisco's core VoIP products among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. It discusses IPv6 Protocols, as well as IP Quality of Service (QoS) and how it applies to Enterprise and Internet Service Provider (ISP) environments.
In addition, Cisco wireless technologies are covered in detail. Cisco has placed a high priority on security and here readers will find complete coverage of all the Cisco Security products such as the PIX firewall suite of products, Network Address Translation (NAT), Cisco VPN Concentrator and IPSec, Cisco Authentication, Authorization, and Accounting (AAA), Content Services Switch (CSS), and the Cisco Secure Network Intrusion Detection System.
This book is sure to become a dog eared reference for all Cisco engineers and administrators.
- The one book that covers all major Cisco Internetworking concepts and configurations.
- The only book to cross reference Cisco internetworking topics: Voice Over IP, Remote Access, Wireless, AVVID, and QoS. In addition, new technologies are covered in depth: AVVID, SIP, MGCP, and more.
- A 1-stop reference for Cisco professionals needing coverage of core Cisco exam topics."

Cisco Security Professional's Guide to Secure Intrusion Detection Systems (Paperback): Syngress Cisco Security Professional's Guide to Secure Intrusion Detection Systems (Paperback)
Syngress
R2,111 Discovery Miles 21 110 Ships in 10 - 15 working days

Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products ... it walks them step by step through all the objectives of the Cisco Secure Intrusion Detection System course (and corresponding exam) that network engineers must pass on their way to achieving sought-after CCSP certification.

Configuring Symantec AntiVirus Enterprise Edition (Paperback, Enterprise ed): Syngress Configuring Symantec AntiVirus Enterprise Edition (Paperback, Enterprise ed)
Syngress
R2,253 Discovery Miles 22 530 Ships in 10 - 15 working days

This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications.
Configuring Symantec AntiVirus Enterprise Edition contains step-by-step instructions on how to Design, implement and leverage the Symantec Suite of products in the enterprise.
OFirst book published on market leading product and fast-growing certification. Despite the popularity of Symantec's products and Symantec Product Specialist certifications, there are no other books published or announced.
OLess expensive substitute for costly on-sight training. Symantec offers week-long courses on this same product for approximately $2,500. This book covers essentially the same content at a fraction of the price, and will be an attractive alternative for network engineers and administrators.
OFree practice exam from [email protected]. Syngress will offer a free Symantec Product Specialist Certification practice exam from syngress.com. Comparable exams are priced from $39.95 to $59.95.

Stealing The Network - How to Own the Box (Paperback): Syngress Stealing The Network - How to Own the Box (Paperback)
Syngress
R1,785 Discovery Miles 17 850 Ships in 10 - 15 working days

"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats," "Black Hats" and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious network intrusions

Cisco Security Specialists Guide to PIX Firewall (Paperback): Syngress Cisco Security Specialists Guide to PIX Firewall (Paperback)
Syngress
R2,183 Discovery Miles 21 830 Ships in 10 - 15 working days

Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
OCoverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0.
OMust-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis.
OFirewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market."

Configuring IPv6 For Cisco IOS (Paperback): Syngress Configuring IPv6 For Cisco IOS (Paperback)
Syngress
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

"By building IPv6 into Cisco IOS software, we are enabling continued growth of the Internet and its expansion into new applications and capabilities in a way that maintains compatibility with existing Internet services." -- Stephen Deering, Cisco Fellow and lead designer of the protocol
Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. Two years ago, in response to the exponential increase in demand for new IP addresses, the Internet Engineering Task Force finalized its revision on IP addressing, called IP Version 6 and key hardware vendors such as Cisco and major Internet Service Providers like AOL announced plans to migrate to IP Version 6. That is now happening. Cisco Systems began incorporating Internet Protocol version 6 (IPv6) in its Cisco IOS Software in June, 2001. Cisco is currently the only major networking vendor to deliver IPv6 across multiple platforms.
This book provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network. It also covers:
Increasing the IP address size from 32 bits to 128 bits
Supporting more levels of addressing hierarchy
Supporting an increased number of addressable nodes
Supporting simpler auto-configuration of addresses
Improving the scalability of multicast routing by adding a "scope" field to multicast addresses
Use a new "anycast address" to send a packet to any one of a group of nodes

Developing .Net Web Services With XML (Paperback): Syngress Developing .Net Web Services With XML (Paperback)
Syngress
R1,815 Discovery Miles 18 150 Ships in 10 - 15 working days

Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability.
Developing .Net Web Services with XML introduces readers to the foundation for the .Net platform. The book covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. Readers will be given a thorough introduction to .NET and its XML building blocks while acquiring a firm grasp of how those blocks can be used to build any Web site or service so that it will federate and collaborate seamlessly with others
.Equips developers with the tool necessary to take advantage of the next generation of the internet
.This book will provide web developers with a firm understanding of XML, the building block of the .Net framework
.Includes practical, real-life applications using XML
.Unrivalled web based support: Readers can receive up-to-the minute links, white papers and analysis for two years at [email protected]."

Hack Proofing Your Network (Paperback, 2nd edition): Syngress Hack Proofing Your Network (Paperback, 2nd edition)
Syngress
R1,880 Discovery Miles 18 800 Ships in 10 - 15 working days

A new edition the most popular Hack Proofing book around
IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including:
.The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems
The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.
Updated coverage of an international bestseller and series flagship
Covers more methods of attack and hacker secrets
Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books
Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials
.A great addition to the bestselling "Hack Proofing..." series
.Windows 2000 sales have surpassed those of Windows NT
.Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp
.Unrivalled web support at [email protected]"

Hackproofing Your Wireless Network (Paperback): Syngress Hackproofing Your Wireless Network (Paperback)
Syngress
R1,864 Discovery Miles 18 640 Ships in 10 - 15 working days

The only way to stop a hacker is to think like one
Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment.
Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.
Uses forensic-based analysis to give the reader an insight into the mind of a hacker
With the growth of wireless networks architects, engineers and administrators will need this book
Up to the minute Web based support at [email protected]

Managing Cisco Network Security (Paperback, 2nd edition): Syngress Managing Cisco Network Security (Paperback, 2nd edition)
Syngress
R2,260 Discovery Miles 22 600 Ships in 10 - 15 working days

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world
"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security Consulting
Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.

Security from a real-world perspective
Key coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, Cisco Intrusion Detection System, and the Cisco Secure Scanner
Revised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) students
Expanded to include separate chapters on each of the security products offered by Cisco Systems

Hack Proofing ColdFusion (Paperback): Syngress Hack Proofing ColdFusion (Paperback)
Syngress
R1,732 Discovery Miles 17 320 Ships in 10 - 15 working days

The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.
Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at [email protected]"

Ruby Developers Guide (Paperback): Syngress Ruby Developers Guide (Paperback)
Syngress
R1,900 Discovery Miles 19 000 Ships in 10 - 15 working days

An expert guide to Ruby, a popular new Object-Oriented Programming Language
Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular Ruby third-party programming tools and applications

Checkpoint Next Generation Security Administration (Paperback): Syngress Checkpoint Next Generation Security Administration (Paperback)
Syngress
R2,157 Discovery Miles 21 570 Ships in 10 - 15 working days

Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.
CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand
Understand NGX R65 Operational Changes:
SVN Architecture, New VPN-1 Features, Additional Features, VPN-1 Power VSX
Deploy SmartClients and SmartManagement:
SmartDashboard, SmartMap, SmartView Tracker, SmartView Monitor, SmartUpdate, SmartLSM, Secure Client Packaging Tool, Management Plug-Ins, Check Point Configuration/cpconfig
Drive the Management Portal:
A Tour of the Dashboard, What s New in SmartDashboard NGX, Your First Security Policy, Other Useful Controls on the Dashboard, Managing Connectra and Interspect Gateways, Smart Portal
Master Advanced Authentication:
Authentication Overview, Users and Administrators, SmartDirectory, User Authentication, Session Authentication, Client Authentication
Use Advanced VPN Concepts for Tunnel Monitoring:
Encryption Overview, VPN Communities, Policy-Based VPN, Route-Based VPN
Configure Advanced VPN Client Installations:
SecuRemote, Secure Client, Office Mode, Visitor Mode, Windows L2TP Integration, SSL Network Extender, Backup Gateways, Multiple Entry Point VPNs
Deploy and Configure SmartDefense:
Network Security, Application Intelligence, Web Intelligence
Get Inside Secure Platform:
Installation, Configuration, Secure Platform Shell, Secure Shell
Learn Advanced Troubleshooting Techniques:
NGX Debugging, Packet Analysis, Log Troubleshooting, VPN Analysis, VPN Client Analysis, ClusterXL Troubleshooting"

Bluetooth Application Developer's Guide (Paperback): Syngress Bluetooth Application Developer's Guide (Paperback)
Syngress
R1,857 Discovery Miles 18 570 Ships in 10 - 15 working days

"Bluetooth (enabled devices) will ship in the billions of units once it gains momentum." - Martin Reynolds, Gartner Group
Bluetooth is the most exciting development in wireless computing this decade Bluetooth enabled devices can include everything from network servers, laptop computers and PDAs, to stereos and home security systems. Most Bluetooth products to hit the market in 2001 will be PC cards for laptop computers and access points, which allow up to seven Bluetooth devices to connect to a network. Reports indicate that by the end of 2003 there will be over 2 billion Bluetooth-enabled devices.
Bluetooth-enabled devices communicate with each other through embedded software applications. Bluetooth Developer's Guide to Embedded Applications will provide embedded applications developers with advanced tutorials and code listings written to the latest Bluetooth's latest specification, version 1.1. Written by Bluetooth pioneers from market leaders in Bluetooth software development, Extended Systems and Cambridge Silicon Radio, this is the first advanced level Bluetooth developer title on the market.
White Hot Topic .While other books introduce readers to the possibilities of Bluetooth, this is the first comprehensive, advanced level programming book written specifically for embedded application developers
Authors are responsible for SDK, the market-leading development tool for Bluetooth
Comes with Syngress' revolutionary Credit Card CD containing a printable HTML version of the book, all of the source code and sample applications from Extended Systems and Cambridge Silicon Radio

Consumers Guide to Cell Phones and Wireless Service Plans (Paperback): Syngress Consumers Guide to Cell Phones and Wireless Service Plans (Paperback)
Syngress
R750 Discovery Miles 7 500 Ships in 10 - 15 working days

Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executive
Experts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming to think of the options available to the consumer when it comes to buying mobile phones, phone accessories, and service plans. So many people are confused by the myriad of wireless phone claims, the endless advertised rates and the countless service plans with all their options. The Consumer's Guide to Cell Phones is designed to help consumers choose what program may best suit them. This book helps streamline the wireless-buying process by providing a complete listing of all wireless providers and the details of their plans.
International listings cover USA, Africa, Asia-Pacific, Australia, Europe, Latin America, and the Middle East. As an example, in Ireland there is coverage of Digiphone and other plans, in Australia of Telstra, in the UK Cellnet, Orange, etc.
The companion web site for the book includes a service provider database
As the mobile market continues to grow more people are looking to use their phone for fax, e-mail or mobile computing - this book has the answers

.NET Mobile Web Developers Guide (Paperback): Syngress .NET Mobile Web Developers Guide (Paperback)
Syngress
R1,828 Discovery Miles 18 280 Ships in 10 - 15 working days

Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.
This book assumes the readers have experience in developing web applications and are familiar with any one of the server-side technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers are frequent speakers at all of the major developer conferences have previously authored best selling books for O'Reilly & Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular ASP .NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for Mobile Web developers

Hack Proofing Sun Solaris 8 (Paperback): Syngress Hack Proofing Sun Solaris 8 (Paperback)
Syngress
R2,173 Discovery Miles 21 730 Ships in 10 - 15 working days

The only way to stop a hacker is to think like one
Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers?
Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.
The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network
Teaches strategy and techniques using forensic-based analysis
Up to the minute Web-based support with [email protected]

Windows 2000 Active Directory (Paperback, 2nd edition): Syngress Windows 2000 Active Directory (Paperback, 2nd edition)
Syngress
R1,921 Discovery Miles 19 210 Ships in 10 - 15 working days

Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.
Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. Systems Engineers will probably spend much of their time over the next several years planning for and deploying Active Directory Services in many different environments. Windows 2000 Active Directory, Second Edition gives IT professionals a head start; it provides updated coverage of everything they will need to succeed.
Many Windows 2000 administrators are struggling with Active Directory and need a comprehensive book on the subject
The first completely updated book on Active Directory to hit the market

Designing A Wireless Network (Paperback): Syngress Designing A Wireless Network (Paperback)
Syngress
R1,759 Discovery Miles 17 590 Ships in 10 - 15 working days

Business is on the move - mobile computing must keep up
Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations.
Designing Wireless Networks provides the necessary information on how to design and implement a wireless network. Beginning with detailed descriptions of the various implementations and architectures of wireless technologies and moving to the step-by-step instructions on how to install and deploy a fixed wireless network; this book will teach users with no previous wireless networking experience how to design and build their own wireless network based on the best practices of the Enhanced Services from Lucent Technologies.
* Timely coverage of new technologies: Communication without cables is the future of netwoking
* Advocates wireless networking solutions for any user, regardless of location, device or connection.
* Written by Experts. The authors are leading WAN authorities at Lucent Technologies.
* No previous wireless experience is assumed, however, readers should have a basic understanding of networking and TCP/IP protocols

Configuring Windows 2000 without Active Directory (Paperback): Syngress Configuring Windows 2000 without Active Directory (Paperback)
Syngress
R1,925 Discovery Miles 19 250 Ships in 10 - 15 working days

Eliminate the hassles of Active Directory - install Windows 2000 without it
Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive abilities to coordinate Internet, intranet, extranets, and management applications creating a complete technical infrastructure. However, there has been a noticeable amount of organizations that are avoiding one of the most talked about features of Windows 2000 - Active Directory. The industry buzz is that Active Directory (although a great product) is a burden to implement and install and is not compatible with non Windows products like Solaris, NetWare and Linux.
Configuring Windows 2000 WITHOUT Active Directory is a complete guide to installation and configuration of Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the new features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. The book does not cover the Active Directory function of Windows 2000.
There is nothing like this book available, yet every Windows 2000 mail list, magazine and online forum shouts for his sort of coverage

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Seagull Clear Storage Box (14lt)
R170 R158 Discovery Miles 1 580
Hampstead
Diane Keaton, Brendan Gleeson, … DVD R66 Discovery Miles 660
Bostik Sew Simple (25ml)
R31 Discovery Miles 310
Mellerware Non-Stick Vapour ll Steam…
R348 Discovery Miles 3 480
Bostik Easy Tear Tape (12mm x 33m)
R14 Discovery Miles 140
Butterfly A4 160gsm Board Pad…
R57 Discovery Miles 570
Dunlop Pro Padel Balls (Green)(Pack of…
R199 R165 Discovery Miles 1 650
Microsoft Xbox Series X Console (1TB…
R14,999 Discovery Miles 149 990
Dungeons & Dragons - Honour Among…
Chris Pine Blu-ray disc R240 R188 Discovery Miles 1 880

 

Partners