Computers / System Administration

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (477)

Linux & UNIX Administration (86)

Windows Administration (52)

 

Language

English (762)

French (13)

German (54)

Spanish (7)

Italian (11)

 

Protection

All (762)

DRM Free (73)

DRM (689)

More options

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

by Ken Sigler, Dan Shoemaker & Anne Kohnke

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security...


Fraud Hotlines: Design, Performance, and Assessment

by Chelsea A. Binns

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge...


PoC or GTFO

by MANUL Laphroaig

This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.

PoC||GTFO follows in the tradition of Phrack and Uninformed...


Practical Monitoring: Effective Strategies for the Real World

by Mike Julian

Do you have a nagging feeling that your monitoring could be improved, but you just aren’t sure how? This is the book for you. Practical Monitoring explains what makes your monitoring less than stellar, and...


Cloud Native Infrastructure: Patterns for Scalable Infrastructure and Applications in a Dynamic Environment

by Justin Garrison & Kris Nova

Cloud native infrastructure is more than servers, network, and storage in the cloud—it is as much about operational hygiene as it is about elasticity and scalability. In this book, you’ll learn practices,...


Ethical Hacking and Computer Securities For Beginners

by Elaiya Iswera Lallan

This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and...


Mastering Linux Kernel Development

by Raghu Bharadwaj

If you are a Linux developer who has familiarity with Kernel programming, but want to improve your Linux Kernel programming abilities to an expert level then this book is for you. It's a long way to go to be...


Cyberspace and Cybersecurity, Second Edition

by George Kostopoulos

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification...


Mastering Windows PowerShell Scripting - Second Edition

by Chris Dent & Brenton J.W. Blawat

Master the art of automating and managing your environment using PowerShell About This Book • Find quick solutions to automate your environment with ease • Work with large amounts of data effortlessly with...


Mastering AWS Security

by Albert Anthony

In depth informative guide to implement and use AWS security services effectively. About This Book • Learn to secure your network, infrastructure, data and applications in AWS cloud • Log, monitor and audit...


MongoDB Administrator's Guide

by Cyrus Dasadia

Manage, fine-tune, secure and deploy your MongoDB solution with ease with the help of practical recipes About This Book • Configure and deploy your MongoDB instance securely, without any hassle • Optimize...


Collaborative Cyber Threat Intelligence: Detecting and Responding to Advanced Cyber Attacks at the National Level

by Florian Skopik

Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical...


Linux Device Drivers Development

by John Madieu

Learn to develop customized device drivers for your embedded Linux system About This Book • Learn to develop customized Linux device drivers • Learn the core concepts of device drivers such as memory management,...


Industrial Cybersecurity

by Pascal Ackerman

Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This Book • Learn about endpoint protection such as anti-malware implementation, updating, monitoring,...


Kali Linux - An Ethical Hacker's Cookbook

by Himanshu Sharma

Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book • Practical recipes to conduct effective penetration testing using the powerful Kali Linux • Leverage tools like Metasploit,...


Cyber Survival Manual

by Nick Selby & Heather Vescent

As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions....


DevOps with Kubernetes

by Hideto Saito, Hui-Chuan Chloe Lee & Cheng-Yang Wu

Learn to implement DevOps using Docker & Kubernetes. About This Book • Learning DevOps, container, and Kubernetes within one book. • Leverage Kubernetes as a platform to deploy, scale, and run containers...


Ethical Hacking and Penetration Testing Guide

by Rafay Baloch

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to...


Puppet 5 Beginner's Guide - Third Edition

by John Arundel

Puppet 5 Beginner's Guide, Third Edition is a practical guide that gets you up and running with the very latest features of Puppet 5. About This Book • Develop skills to run Puppet 5 on single or multiple...


Implementing Modern DevOps

by David Gonzalez

Help your organization join the DevOps revolution About This Book • Helps you skill up your DevOps knowledge without a strong set of prerequisites • Deliver continuously improved software by showcasing the...