Computers / System Administration

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (312)

Windows Administration (25)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (398)

French (11)

German (1)

Spanish (3)

Italian (7)

 

Protection

All (398)

DRM Free (72)

DRM (326)

More options

2014 Car Hacker's Manual

by Craig Smith

As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are...


Social Engineering in It Security: Tools, Tactics, and Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


Puppet Reporting and Monitoring

by Duffy Michael

An easy to follow guide with extensive examples to explain Puppet's reporting capabilities to facilitate effective implementation of Puppet in the real world as a reporting tool.If you are a Puppet developer...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable,...


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


OCP Upgrade to Oracle Database 12c Exam Guide (Exam 1Z0-060)

by Sam R. Alapati

This exclusive Oracle Press exam guide offers intense preparation for the Oracle Database 12c New Features for Administrators exam.

Ideal as both a self-study tool and an on-the-job reference, OCP Oracle Database...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...


Unmasking the Social Engineer: The Human Element of Security

by Christopher Hadnagy & Paul Ekman

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge...


Data-Driven Security: Analysis, Visualization and Dashboards

by Jay Jacobs & Bob Rudis

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This...


Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security...


The Debian Administrator's Handbook

by Raphaël Hertzog & Roland Mas

Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world,...


Carry On: Sound Advice from Schneier on Security

by Bruce Schneier

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance....


Anti-Hacker Tool Kit, Fourth Edition

by Mike Shema

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range...


Network Security Tools: Writing, Hacking, and Modifying Security Tools

by Nitesh Dhanjani & Justin Clarke

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more...


Node Security

by Barnes Dominic

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using...


Linux Utilities Cookbook

by Lewis James Kent

A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when...