Computers / System Administration

New Releases

icon Subscribe to feed


Best Selling

New Releases



Delete System Administration


In category

Security (359)

Linux & UNIX Administration (45)

Windows Administration (33)



English (504)

French (12)

German (39)

Spanish (7)

Italian (10)



All (504)

DRM Free (71)

DRM (433)

More options

OpenStack Networking Essentials

by James Denton

Build and manage networks in OpenStack using Neutron About This Book • Deploy an all-in-one cloud based on OpenStack Liberty (2015.2) using RDO • Learn the fundamentals of the Neutron API including networks,...

Sensitive Security Information, Certified® (SSI) Body of Knowledge

by American Board for Certification in Home

Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types...

Introduction to Criminal Justice Information Systems

by Ralph Ioimo

The proliferation of information systems throughout the criminal justice system has prompted many universities supporting criminal justice programs to add criminal justice information systems technology to their...

New Developments in Biological and Chemical Terrorism Countermeasures

by Ronald J. Kendall, Steven M. Presley & Seshadri S. Ramkumar

A science-based text, New Developments in Biological and Chemical Terrorism Countermeasures presents research that addresses the growing threat of chemical and biological terrorism as well as the need for improvements...

Threat Assessment and Management Strategies: Identifying the Howlers and Hunters, Second Edition

by Frederick S. Calhoun & J.D., Stephen W. Weston

The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes,...

Security without Obscurity: A Guide to PKI Operations

by Jeff Stapleton & W. Clay Epstein

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements....

State Fragility Around the World: Fractured Justice and Fierce Reprisal

by Laurie A. Gould & Matthew Pate

Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics...

XenServer Administration Handbook: Practical Recipes for Successful Deployments

by Tim Mackey & J. K. Benedict

Packed with practical advice, this hands-on guide provides valuable information you need to most effectively optimize and manage the XenServer open source virtualization platform. Whether you run a modest installation...

Troubleshooting System Center Configuration Manager

by Peter Egerton & Gerry Hampson

Troubleshoot all the aspects of your Configuration Manager installation, from basic easy checks to the advanced log files and serious issues About This Book • Learn to troubleshoot Configuration Manager 2012...

VMware Performance and Capacity Management - Second Edition

by Iwan 'e1' Rahabok

Master SDDC Operations with proven best practices About This Book • Understand the drawbacks of the traditional paradigm and management that make operations difficult in SDDC • Master performance and capacity...

Learning Puppet 4: A Guide to Configuration Management and Automation

by Jo Rhett

If you’re a system administrator, developer, or site reliability engineer responsible for handling hundreds or even thousands of nodes in your network, the Puppet configuration management tool will make your...

Site Reliability Engineering: How Google Runs Production Systems

by Betsy Beyer, Chris Jones & Jennifer Petoff

The overwhelming majority of a software system’s lifespan is spent in use, not in design or implementation. So, why does conventional wisdom insist that software engineers focus primarily on the design and...

Extending Ansible

by Rishabh Das

Discover how to efficiently deploy and customize Ansible in the way your platform demands About This Book • Get the first book on the market that maximizes the functionalities of Ansible • Master the skill...

Advanced Penetration Testing for Highly-Secured Environments - Second Edition

by Lee Allen & Kevin Cardwell

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments About This Book • Learn how to build your own pentesting lab environment to practice advanced techniques...

Extending SaltStack

by Joseph Hall

Extend the power of your infrastructure and applications with Salt modules About This Book • Get the most up-to-date practical resource on writing new Salt modules and extending Salt • Learn through use...

Learning CoreOS

by Kingston Smiler. S & Shantanu Agrawal

Your one-stop guide for building, configuring, maintaining, and deploying one of the world's fastest growing OSes About This Book • Understand the features of CoreOS and learn to administrate and secure a...

Nagios Core Administration Cookbook - Second Edition

by Tom Ryder

Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your network About This Book • Master the advanced configuration techniques of Nagios Core to model your network better...

Learning Linux Binary Analysis

by Ryan "elfmaster" O'Neill

Uncover the secrets of Linux binary analysis with this handy guide About This Book • Grasp the intricacies of the ELF binary format of UNIX and Linux • Design tools for reverse engineering and binary forensic...

Mastering CoreOS

by Sreenivas Makam

Create production CoreOS clusters and master the art of deploying Container-based microservices About This Book • Confidently deploy distributed applications and effectively manage distributed infrastructure...

Mastering Kali Linux Wireless Pentesting

by Jilumudi Raghu Ram & Brian Sak

Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About This Book • Develop your skills using attacks such as wireless cracking, Man-in-the-Middle,...