Computers / System Administration / Security

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (351)

French (6)

German (1)

Spanish (0)

Italian (6)

 

Protection

All (351)

DRM Free (47)

DRM (304)

More options

Oracle Database 12c Security

by Scott Gaetjen, David Knox & William Maroulis

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing,...


Hyper-V Security

by Siron Eric & Syrewicze Andy

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the...


Burp Suite Essentials

by Mahajan Akash

If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic...


CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002

by Michael Gregg

CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam

CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition...


CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique...


2014 Car Hacker's Manual

by Craig Smith

As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are...


Social Engineering in IT Security: Tools, Tactics, and Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

This book contains the key information security professionals want to know from the best minds in the industry


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

A simple and complete introduction to the fundamentals of information security


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

by Aditya Sood & Richard Enbody

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual,...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


Collaboration with Cloud Computing: Security, Social Media, and Unified Communications

by Ric Messier

Written by experts, explains how cyber-warfare has been performed, why it is the new means of warfare and the relevant military, policy, social, and scientific issues at play.


Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

by Bill Blunden & Violet Cheung

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat...


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

by Harlan Carvey

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free...


Network Security Through Data Analysis: Building Situational Awareness

by Michael Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...