Computers / System Administration

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (317)

Windows Administration (24)

Linux & UNIX Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (406)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (406)

DRM Free (68)

DRM (338)

More options

CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002

by Michael Gregg

CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam

CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition...


Learning Cocos2d-X Game Development

by Shekar Siddharth

If you are a hobbyist, novice game developer, or programmer who wants to learn about developing games/apps using Cocos2d-x, this book is ideal for you.


CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...


Customizing Chef

by Jon Cowie

Take advantage of Chef’s highly customizable design to tackle specific automation issues that you can’t solve by simply using Chef’s tools, resources, and services out of the box. With this practical guide,...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique...


Learning McOllective: Parallel Server Management in Puppet and Chef

by Jo Rhett

Orchestrate change across server clusters in near realtime with MCollective, the framework that works in concert with Puppet, Chef, and other configuration management tools. Ideal for system administrators and...


2014 Car Hacker's Manual

by Craig Smith

As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are...


Social Engineering in It Security: Testing Tools, Tactics & Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


Puppet Reporting and Monitoring

by Duffy Michael

An easy to follow guide with extensive examples to explain Puppet's reporting capabilities to facilitate effective implementation of Puppet in the real world as a reporting tool.If you are a Puppet developer...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable,...


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


AutoIt v3: Your Quick Guide

by Andy Flesner

AutoIt is becoming increasingly popularin the system administration field as atool for automating administrative tasks.Although this is one of its more popularuses, you can use AutoIt to automateanything in...


Ocp Upgrade to Oracle Database 12c Exam Guide (Exam 1z0-060)

by Sam R. Alapati

A Fully Integrated Study System for OCP Exam 1Z0-060

Prepare for the Oracle Certified Professional Upgrade to Oracle Database 12c exam with this exclusive Oracle Press guide. Each chapter features step-by-step...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


Oracle WebLogic Server 12c Administration Handbook

by Sam R. Alapati

Best Practices for Oracle WebLogic Server 12c Configuration and Administration

Maintain a high-performance enterprise application framework using the detailed information in this authoritative resource. Through...


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

by Harlan Carvey

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...