Skip to content
Scan a barcode
Scan

James Relington

Follow to get improved recommendations.

Books by James Relington

Introduction to IT Service Management (ITSM) Frameworks B0F8442LZV Book Cover

Introduction to IT Service Management (ITSM) Frameworks

James Relington

$14.12

Audit and Compliance in IAM: SOX, GDPR, HIPAA, NIST, ISO 27001 (Identity in Cybersecurity) B0DXL1Z6NB Book Cover

Audit and Compliance in IAM: SOX, GDPR, HIPAA, NIST, ISO 27001 (Identity in Cybersecurity)

James Relington

$14.12

SCIM in Identity Management B0DXFH5NJB Book Cover

SCIM in Identity Management

James Relington

$14.12

Dynamic Routing: OSPF, EIGRP and BGP in Cisco, Juniper and Mikrotik B0F3W7Z6XC Book Cover

Dynamic Routing: OSPF, EIGRP and BGP in Cisco, Juniper and Mikrotik

James Relington

$14.25

Governance, Risk, and Compliance (GRC) in Cybersecurity: All you need to know B0DXVHZD8L Book Cover

Governance, Risk, and Compliance (GRC) in Cybersecurity: All you need to know

James Relington

$14.12

Managing Virtual Machines: Hypervisors, Snapshots, and Resource Allocation B0F7FBTDTX Book Cover

Managing Virtual Machines: Hypervisors, Snapshots, and Resource Allocation

James Relington

$14.12

Power Over Ethernet (PoE): Theory, Design, and Best Practices B0FCC4J2CR Book Cover

Power Over Ethernet (PoE): Theory, Design, and Best Practices

James Relington

$14.12

How to become a Help Desk Analyst (Service Desk / IT support) B0DY7R3PZ1 Book Cover

How to become a Help Desk Analyst (Service Desk / IT support)

James Relington

$14.12

SIEM Systems: Design and Deployment B0F1L9GJQR Book Cover

SIEM Systems: Design and Deployment

James Relington

$14.25

Barcode and RFID Systems in IT Operations: Deployment and Integration B0FDQSZ4M2 Book Cover

Barcode and RFID Systems in IT Operations: Deployment and Integration

James Relington

$14.12

Network Security Protocols: IPsec, SSL/TLS, DTLS and More B0F3TXFXQX Book Cover

Network Security Protocols: IPsec, SSL/TLS, DTLS and More

James Relington

$14.12

Kerberos: Secure Authentication in Enterprise Networks B0F24FQNB4 Book Cover

Kerberos: Secure Authentication in Enterprise Networks

James Relington

$14.12

Identity Lifecycle Management (Identity in Cybersecurity) B0DWKFYNS4 Book Cover

Identity Lifecycle Management (Identity in Cybersecurity)

James Relington

$14.25

OpenID Connect: All you need to know (Identity in Cybersecurity) B0DWN1NZL7 Book Cover

OpenID Connect: All you need to know (Identity in Cybersecurity)

James Relington

$14.12

Inside Social Media Algorithms:: Breaking Down How Platforms Work and the Influence of Algorithms on Our Lives B0DYVLCNKT Book Cover

Inside Social Media Algorithms:: Breaking Down How Platforms Work and the Influence of Algorithms on Our Lives

James Relington

$14.25

Industrial Cybersecurity and Operational Technology Security (OT) B0DXQ1GBQ8 Book Cover

Industrial Cybersecurity and Operational Technology Security (OT)

James Relington

$14.12

Open RAN Transport: eCPRI Fronthaul, Synchronization, and QoS Design B0FY1PJB1S Book Cover

Open RAN Transport: eCPRI Fronthaul, Synchronization, and QoS Design

James Relington

$14.12

Data Encryption and Cryptographic Methods B0FNK58STJ Book Cover

Data Encryption and Cryptographic Methods

James Relington

$14.25

Rethinking Retirement: Active Aging & New Lifestyles B0FKZ1MMHX Book Cover

Rethinking Retirement: Active Aging & New Lifestyles

James Relington

$14.12

Web Application Pentesting B0DY1NDMF2 Book Cover

Web Application Pentesting

James Relington

$14.12

Advanced BGP: Route Engineering and Traffic Policies B0F3TWF2J6 Book Cover

Advanced BGP: Route Engineering and Traffic Policies

James Relington

$14.12

The Fundamentals of Fiber Optic Networking B0F9HKZ3NZ Book Cover

The Fundamentals of Fiber Optic Networking

James Relington

$14.12

The Basics of Serial Communication and Legacy Protocols B0FCCFKTPK Book Cover

The Basics of Serial Communication and Legacy Protocols

James Relington

$14.25

Digital Forensics for Blue Teams: Memory, Disk, and Live Response Techniques B0FK5KSMGH Book Cover

Digital Forensics for Blue Teams: Memory, Disk, and Live Response Techniques

James Relington

$14.12

OAuth 2.0: All you need to know (Identity in Cybersecurity) B0DWN29GD5 Book Cover

OAuth 2.0: All you need to know (Identity in Cybersecurity)

James Relington

$14.12

Machine Identity Management: Protecting Non-Human Identities in the Enterprise B0F1N65CJM Book Cover

Machine Identity Management: Protecting Non-Human Identities in the Enterprise

James Relington

$14.25

Threat hunting in Cybersecurity B0DY1S2WRJ Book Cover

Threat hunting in Cybersecurity

James Relington

$14.12

Network Automation with Ansible and NETCONF B0F6KG6PC8 Book Cover

Network Automation with Ansible and NETCONF

James Relington

$14.12

IT Asset and Device management: ITSM, ITAM, IDM B0DWXQHJHZ Book Cover

IT Asset and Device management: ITSM, ITAM, IDM

James Relington

$14.25

Malware Analysis in Cybersecurity: The complete guide B0DY53211F Book Cover

Malware Analysis in Cybersecurity: The complete guide

James Relington

$14.12

of 12
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured