Computers / System Administration

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (351)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (445)

French (10)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (445)

DRM Free (69)

DRM (376)

More options

Oracle Database 12c Security

by Scott Gaetjen, David Knox & William Maroulis

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing,...


Hyper-V Security

by Siron Eric & Syrewicze Andy

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the...


Burp Suite Essentials

by Mahajan Akash

If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic...


Microsoft System Center 2012 R2 Compliance Management Cookbook

by Baumgarten Andreas & Isherwood Ronnie

Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements,...


CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002

by Michael Gregg

CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam

CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition...


Learning Cocos2d-X Game Development

by Shekar Siddharth

If you are a hobbyist, novice game developer, or programmer who wants to learn about developing games/apps using Cocos2d-x, this book is ideal for you.


CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...


Customizing Chef

by Jon Cowie

Take advantage of Chef’s highly customizable design to tackle specific automation issues that you can’t solve by simply using Chef’s tools, resources, and services out of the box. With this practical guide,...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique...


Learning McOllective: Parallel Server Management in Puppet and Chef

by Jo Rhett

Orchestrate change across server clusters in near realtime with MCollective, the framework that works in concert with Puppet, Chef, and other configuration management tools. Ideal for system administrators and...


2014 Car Hacker's Manual

by Craig Smith

As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are...


Social Engineering in IT Security: Tools, Tactics, and Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering...


System Center 2012 R2 Virtual Machine Manager Cookbook

by Cardoso Edvaldo Alessandro

This book is a step-by-step guide packed with recipes that cover architecture design and planning. The book is also full of deployment tips, techniques, and solutions. If you are a solutions architect, technical...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


Puppet Reporting and Monitoring

by Duffy Michael

An easy to follow guide with extensive examples to explain Puppet's reporting capabilities to facilitate effective implementation of Puppet in the real world as a reporting tool.If you are a Puppet developer...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

This book contains the key information security professionals want to know from the best minds in the industry


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

A simple and complete introduction to the fundamentals of information security


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


AutoIt v3: Your Quick Guide

by Andy Flesner

AutoIt is becoming increasingly popularin the system administration field as atool for automating administrative tasks.Although this is one of its more popularuses, you can use AutoIt to automateanything in...


Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

by Aditya Sood & Richard Enbody

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual,...