Feeds

Enjoy our Valentine's Day computer books love-in

Buy books and win chocolate

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Romantic opportunity It's that time of year when the daffodils are bursting forth from the cruel earth, the sap is rising, and a young man's thoughts turn to romance.

For today is Valentine's Day - a time to celebrate matters of the heart. It's also, by an amazing co-incidence, an ideal moment to stock up on computer reference books, courtesy of IT-minds.com bookstore.

Go on - you know you want it

Sadly, we can't offer you two dozen red roses. But what we can offer you is a whopping 20 per cent off two dozen selected IT titles from Reg associate IT-minds.com and the chance to win one of three "chocolate laptops". What on earth, you are doubtless thinking, is a chocolate laptop? Well, according to our resident confectionary expert, the spec includes a state of the art array of chocolate components, together with an external mouse attachment (includes a back-up mouse in case the first one gets tired!).

Incredible. Who said romance was dead? Now, all you have to do is proceed directly to IT-minds, buy one of the discounted titles and you'll automatically be entered for the chocolate laptop draw. Simple as that. This offer is for today - 14th February - only, and expires at midnight GMT. Winners will be notified next week and the goods dispatched post haste.

And if the prospect of chocolate doesn't set you loins astir, remember that IT-minds offers discounts and special offers to Reg readers all year round. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.