Computers / System Administration / Security

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Language

English (422)

French (8)

German (18)

Spanish (1)

Italian (8)

 

Protection

All (422)

DRM Free (48)

DRM (374)

More options

Beautiful Security: Leading Security Experts Explain How They Think

by Andy Oram & John Viega

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about,...


Kerberos: The Definitive Guide: The Definitive Guide

by Jason Garman

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system...


Linux iptables Pocket Reference

by Gregor N. Purdy

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables...


Web Security, Privacy & Commerce

by Simson Garfinkel & Gene Spafford

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats...


Information Risk Management: A practitioner's guide

by David Sutton

Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development...


Burp Suite Essentials

by Mahajan Akash

If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic...


Oracle Database 12c Security

by Scott Gaetjen, David Knox & William Maroulis

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing,...


Security 2020: Reduce Security Risks This Decade

by Doug Howard & Kevin Prince

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security...


Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

by Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

by Tom Canavan

Learn to secure Web sites built on open source CMSs

Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you're responsible for one of them, this comprehensive security...


A Practical Guide to Trusted Computing

by David Challener, Kent Yoder & Ryan Catherman

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed...


Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Softw

by Christian Collberg & Jasvir Nagra

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”...


Secure Programming with Static Analysis

by Brian Chess & Jacob West

The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite...


Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities

by Vittorio Bertocci, Garrett Serack & Caleb Baker

WiUnderstanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Digital Short Cut)

by Rand Morimoto

This is the eBook version of the printed book.

With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption...


Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training,...


Geekonomics: The Real Cost of Insecure Software (paperback)

by David Rice

The Real Cost of Insecure Software

 

•   In 1996, software defects in a Boeing 757 caused a crash that killed 70 people…

•   In 2003, a software vulnerability helped cause the largest U.S. power outage...


Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

by Will Gragido & John Pirc

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber...


Computer and Information Security Handbook

by John R. Vacca

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the...