Computers / System Administration

New Releases

icon Subscribe to feed

Browse

New & Noteworthy

Best Selling

New Releases

 

Language

English (32)

French (12)

German (55)

Spanish (8)

Italian (13)

 

Category

Delete System Administration

 

In category

Security (17)

Linux & UNIX Administration (4)

Windows Administration (3)

 

Protection

All (32)

DRM Free (8)

DRM (24)

More options

Free Opensource Video Editor For Beginner & Youtube Creator

by Muhammad Vandestra & Dragon Promedia Studio

Complete list free and opensource video editor software available on Windows, Mac and Linux. For indie movie maker, youtube creator, college student and beginner.


Guide How To Install Windows Xp Sp3 For Beginner (Edition 2018)

by Dragon Promedia Studio

Guide How To Install Windows Xp Sp3 Complete With Picture For Beginner.

Windows XP (codenamed Whistler) is a personal computer operating system that was produced by Microsoft as part of the Windows NT family...


Guide How To Migrate Windows 10 Operating System From HDD To SSD

by Muhammad Vandestra & Dragon Promedia Studio

Guide how to move and migrate Windows 10 operating system from hdd to ssd without reinstall, gradually for beginner complete with picture. Panduan cara memindahkan sistem operasi windows 10 dari hdd ke ssd tanpa...


List Anti Rootkit & AntiVirus For Ubuntu, Linux & BSD (Edition 2018)

by Muhammad Vandestra & Dragon Promedia Studio

All computer systems can suffer from malware, ransomware, rootkit and viruses, including Linux and BSD. Thankfully, very few viruses exist for Linux, so users typically do not install antivirus software. It...


The Ultimate GDPR Practitioner Guide

by Stephen R Massey

The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR. The book is crammed with advice, guidance and...


Ethical Hacking and Computer Securities For Beginners

by Elaiya Iswera Lallan

This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and...


Cyber Survival Manual

by Nick Selby & Heather Vescent

As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions....


Privacy

by Leslie P. Francis & John G. Francis

We live more and more of our lives online; we rely on the internet as we work, correspond with friends and loved ones, and go through a multitude of mundane activities like paying bills, streaming videos, reading...


CompTIA Linux+ and LPIC Practice Tests

by Steve Suehring

Boost your Linux+/LPIC readiness with practice tests for all exam domains

CompTIA Linux+ and LPIC Practice Tests provide 100% coverage of all exam objectives for both the CompTIA Linux+ exams LX0-103 and LX0-104,...


Digital Forensic Science

by Vassil Roussev, Elisa Bertino & Ravi Sandhu

Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical...


Landscape of Cybersecurity Threats and Forensic Inquiry

by Joseph O. Esin

Cybersecurity threats are not isolated occurrences and must be recognized as global operations requiring collaborative measures to prepare cyber graduates and organizations personnel on the high impact of cybercrimes...


Privacy Risk Analysis

by Sourya Joyee De & Daniel Le Métayer

Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.

The deployment of new information...


How to Measure Anything in Cybersecurity Risk

by Richard Seiersen, Douglas W. Hubbard, Stuart McClure & Daniel E. Geer, Jr.

A ground shaking exposé on the failure of popular cyber risk management methods

How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series...


IT Service Management: Support for your ITSM Foundation exam

by John Sansbury, Ernest Brewster, Aidan Lawes & Richard Griffiths

Covering the latest thinking in IT service management, this new edition provides a comprehensive introduction for those preparing for their ITSM foundation exam.


Computer Crimes and Digital Investigations

Information Security Auditor: Careers in information security

by Wendy Goucher

The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering...


The Debian Administrator's Handbook

by Raphaël Hertzog & Roland Mas

Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world,...


Computer Security (Speedy Study Guides)

by Speedy Publishing

Computer thieves are everywhere and most of them are untraceable for weeks - months maybe. Learning to add computer security will ensure that all sensitive information stored online are kept safe. This quick...


Information Risk Management: A practitioner's guide

by David Sutton

Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development...


Problem Management: An implementation guide for the real world

by Michael G. Hall

Problem management is the IT service management process that tends to return more benefits more quickly than any of the others. This book offers real-world guidance on all aspects of implementing and running...