Computers / System Administration

New Releases

icon Subscribe to feed


Best Selling

New Releases



Delete System Administration


In category

Security (482)

Linux & UNIX Administration (87)

Windows Administration (53)



English (775)

French (14)

German (55)

Spanish (7)

Italian (11)



All (775)

DRM Free (73)

DRM (702)

More options

Windows Server 2016 Administration Fundamentals

by Bekim Dauti

Manage and administer your environment with ease About This Book • Get your hands on learning the fundamentals to managing and administering Windows Server 2016. • A step-by-step guide that will help you...

Containerization with Ansible 2

by Aric Renzo

Automate the container lifecycle from image build through cloud deployment using the automation language you already know. About This Book • Use Ansible Container as an integral part of your workflow to increase...

ESP8266 Robotics Projects

by Pradeeka Seneviratne

Build simple yet amazing robotics projects using ESP8266 About This Book • Get familiar with ESP8266 and its features. • Build Wi-FI controlled robots using ESP8266 • A project based book that will use...

IoT Penetration Testing Cookbook

by Aaron Guzman & Aditya Gupta

Over 80 recipes to master IoT security techniques. About This Book • Identify vulnerabilities in IoT device architectures and firmware using software and hardware pentesting techniques • Understand radio...

Cloud Foundry for Developers

by Rick Farmer, Rahul Jain & David Wu

Deploy and scale applications on Cloud Foundry About This Book • Gain hands-on experience using Cloud Foundry • Implement deployment, management and scaling of applications on Cloud Foundry • Learn best...

OpenStack Bootcamp

by Vinoth Kumar Selvaraj

A focused and systematic introduction to OpenStack, the largest open source cloud platform, using practical examples and hands-on problems. About This Book • Explore all the new features of OpenStack's Mikata,...

Mastering Microsoft Dynamics CRM 2016

by Deepesh Somani

This comprehensive guide covers all the essential features of Dynamics CRM so you can build effective applications. About This Book • Harness the full power of Dynamics CRM 2016 through real-world scenarios...

Spring Security - Third Edition

by Mick Knutson, Robert Winch & Peter Mularien

Learn how to secure your Java applications from hackers using Spring Security 4.2 About This Book • Architect solutions that leverage the full power of Spring Security while remaining loosely coupled. •...

Python Penetration Testing Cookbook

by Rejah Rehim

Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery path About This Book • Learn to detect and avoid various types of attack that put system...

Serious Cryptography: A Practical Introduction to Modern Encryption

by Jean-Philippe Aumasson

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated...

AWS Automation Cookbook

by Nikit Swaraj

Automate release processes, deployment, and continuous integration of your application as well as infrastructure automation with the powerful services offered by AWS About This Book • Accelerate your infrastructure's...

Deployment with Docker

by Srdjan Grubor

A practical guide to rapidly and efficiently mastering Docker containers, along with tips and tricks learned in the field. About This Book • Use Docker containers, horizontal node scaling, modern orchestration...

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

by Ken Sigler, Dan Shoemaker & Anne Kohnke

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security...

Fraud Hotlines: Design, Performance, and Assessment

by Chelsea A. Binns

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge...


by MANUL Laphroaig

This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.

PoC||GTFO follows in the tradition of Phrack and Uninformed...

Practical Monitoring: Effective Strategies for the Real World

by Mike Julian

Do you have a nagging feeling that your monitoring needs improvement, but you just aren’t sure where to start or how to do it? Are you plagued by constant, meaningless alerts? Does your monitoring system routinely...

Cloud Native Infrastructure: Patterns for Scalable Infrastructure and Applications in a Dynamic Environment

by Justin Garrison & Kris Nova

Cloud native infrastructure is more than servers, network, and storage in the cloud—it is as much about operational hygiene as it is about elasticity and scalability. In this book, you’ll learn practices,...

Ethical Hacking and Computer Securities For Beginners

by Elaiya Iswera Lallan

This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and...

Mastering Linux Kernel Development

by Raghu Bharadwaj

If you are a Linux developer who has familiarity with Kernel programming, but want to improve your Linux Kernel programming abilities to an expert level then this book is for you. It's a long way to go to be...

Cyberspace and Cybersecurity, Second Edition

by George Kostopoulos

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification...