Computers / System Administration

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (382)

Linux & UNIX Administration (28)

Windows Administration (27)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (488)

French (11)

German (31)

Spanish (5)

Italian (8)

 

Protection

All (488)

DRM Free (71)

DRM (417)

More options

Smart Grid Security: Innovative Solutions for a Modernized Grid

by Florian Skopik

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided...


Introduction to Network Security: Theory and Practice

by Jie Wang & Zachary A. Kissel

Introductory textbook in the important area of network security for undergraduate and graduate students

• Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P,...


Thinking in Promises

by Mark Burgess

Imagine a set of simple principles that could help you to understand how parts combine to become a whole, and how each part sees the whole from its own perspective. If such principles were any good, it shouldn’t...


CoreOS Essentials

by Mocevicius Rimantas

If you are a system administrator with experience in network virtualization and want to develop computing networks for deploying applications and servers, then this is the book for you. Knowledge of Linux operating...


Salt Essentials

by Craig Sebenik & Thomas Hatch

Get a complete introduction to Salt, the widely used Python-based configuration management and remote execution tool. This practical guide not only shows system administrators how to manage complex infrastructures...


Docker: Up & Running

by Karl Matthias & Sean P. Kane

Docker is quickly changing the way that organizations are deploying software at scale. But understanding how Linux containers fit into your workflow—and getting the integration details right—are not trivial...


Vehicular Ad Hoc Network Security and Privacy

by Xiaodong Lin & Rongxing Lu

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks

  • Take a cooperative approach towards addressing the technology’s challenges...


VMware vCenter Cookbook

by Kuminsky Konstantin

If you are a system administrator who has some experience with virtualization and already uses VMware vCenter, but wishes to learn more, then this is the book for you. If you are looking for tips or shortcuts...


Leveraging Consumer Psychology for Effective Health Communications: The Obesity Challenge: The Obesity Challenge

by Rajeev Batra, Victor J. Strecher & Punam Anand Keller

This timely book brings together some of the most higly respected scholars and practitioners in the consumer psychology and health communication fields to analyze how the latest research can be effectively applied...


Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

by Jeff Bollinger, Brandon Enright & Matthew Valites

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security...


Ansible: Up and Running

by Lorin Hochstein

Among the many configuration management tools available, Ansible has some distinct advantages—it’s minimal in nature, you don’t need to install anything on your nodes, and it has an easy learning curve....


Git Essentials

by Santacroce Ferdinando

If you are a software developer with little or no experience of versioning systems, or are familiar with other centralized versioning systems, then this book is for you. If you have some experience working with...


Microsoft System Center PowerShell Essentials

by HP Guruprasad & Patel Harshul

If you are a Microsoft System Center administrator who manages System Center environments and utilizes the console for management, then this book is ideal for you. This book is also for System Center users who...


Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges

by Qing Li & Gregory Clark

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal...


Kali Linux Wireless Penetration Testing: Beginner's Guide

by Ramachandran Vivek & Buchanan Cameron

If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is...


Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

by Michele Fincher, Christopher Hadnagy & Robin Dreeke

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and...


Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

by Bruce Schneier

You are under surveillance right now.

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick,...


Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

by Marc Goodman

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals,...


Zabbix Network Monitoring Essentials

by Vacche Andrea Dalle & Lee Stefano Kewan

If you are an experienced network administrator looking for a comprehensive monitoring solution that will keep a watchful eye on networks, then this book is for you.


The Mobile Application Hacker's Handbook

by Dominic Chell, Tyrone Erasmus & Shaun Colley

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from...