0 - 500
0
500

USB 3.0 / eSATA 5-Bay Hot-Swap 2.5/3.5″ SATA III Hard Drive Enclosure with UASP – 5-Bay SATA 6 Gbps Enclosure for HDD / SSD

USB 3.0 / eSATA 5-Bay Hot-Swap 2.5/3.5″ SATA III Hard Drive Enclosure with UASP – 5-Bay SATA 6 Gbps Enclosure for HDD / SSD

The S355BU33ERM 5-bay Removable Hard Drive Enclosure lets you access five individual 2.5″ or 3.5″ hard drives simultaneously, through a single eSATA or USB port connection to your laptop or desktop computer. For fast performance and efficient data transfers, you can connect the removable drive enclosure to your computer through either eSATA or USB 3.0.…

Understanding Computers: Today and Tomorrow: Comprehensive

Understanding Computers: Today and Tomorrow: Comprehensive

Discover a modern introduction to computer concepts with UNDERSTANDING COMPUTERS: TODAY AND TOMORROW, COMPREHENSIVE, 16E. Known for a unique emphasis on societal issues and industry insights from respected leaders, this book provides reliable information to help you learn about emerging technologies that may impact the way industries conduct business in the future. You become familiar…

(Old Model) Seagate 8TB NAS HDD SATA 6Gb/s NCQ 256 MB Cache Bare Drive ST8000VN0002

(Old Model) Seagate 8TB NAS HDD SATA 6Gb/s NCQ 256 MB Cache Bare Drive ST8000VN0002

Ideal for small business servers or home video and central storage, the Seagate NAS HDDs are built and tested to provide industry-leading performance for small 1- to 5-bay NAS systems. Expect always-on, 24×7 reliability and the NASWorks technology features that simplify your installation, customize error recovery controls, power management and vibration tolerance.Ideal for high performance…

Implementing 802.1X Security Solutions for Wired and Wireless Networks

Implementing 802.1X Security Solutions for Wired and Wireless Networks

You know it?s essential, and you’ve heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you…

Computer and Information Security Handbook

Computer and Information Security Handbook

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new…

Active Directory: Designing, Deploying, and Running Active Directory

Active Directory: Designing, Deploying, and Running Active Directory

Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling guide gives you a thorough grounding of Microsoft’s network directory service by explaining concepts in an easy-to-understand, narrative style. You’ll negotiate a maze of technologies for deploying a scalable…

WD Blue 1TB Internal SSD – SATA III 6 Gb/s, 2.5″/7mm – WDS100T1B0A

WD Blue 1TB Internal SSD – SATA III 6 Gb/s, 2.5″/7mm – WDS100T1B0A

Wd Blue 1Tb Internal Ssd Solid State Drive – Sata 6Gb/S 2.5 Inch – Wds100T1B0ASequential read speeds of up to 545MB/s and sequential write speeds of up to 525MB/s.An industry-leading 1.75M hours Mean Time To Failure (MTTF) and several error-correction technologies for lasting reliability.Optimized for multitasking to simultaneously run resource-heavy applications without system slow-down.Available in…

Regulating the Cloud: Policy for Computing Infrastructure (Information Policy)

Regulating the Cloud: Policy for Computing Infrastructure (Information Policy)

The emergence of the cloud as infrastructure: experts from a range of disciplines consider policy issues including reliability, privacy, consumer protection, national security, and copyright.The emergence of cloud computing marks the moment when computing has become, materially and symbolically, infrastructure―a sociotechnical system that is ubiquitous, essential, and foundational. Increasingly integral to the operation of other…