Computers / System Administration / Security

Best Selling / Page 2

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (317)

French (8)

German (1)

Spanish (0)

Italian (7)

 

Protection

All (317)

DRM Free (46)

DRM (271)

More options

CMS Security Handbook: The Comprehensive Guide for Wordpress, Joomla, Drupal, and Plone

by Tom Canavan

Learn to secure Web sites built on open source CMSs

Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you’re responsible for one of them, this comprehensive security...


Secrets and Lies: Digital Security in a Networked World

by Bruce Schneier

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network

Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to...


The Shellcoder's Handbook: Discovering and Exploiting Security Holes

by Chris Anley, John Heasman & Felix Lindner

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material...


CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002

by Michael Gregg

CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam

CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition...


A Practical Guide to Trusted Computing

by David Challener, Kent Yoder & Ryan Catherman

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed...


Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection

by Christian Collberg & Jasvir Nagra

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”...


Secure Programming with Static Analysis

by Brian Chess & Jacob West

The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite...


Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities, Adobe Reader

by Vittorio Bertocci, Garrett Serack & Caleb Baker

WiUnderstanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Digital Short Cut)

by Rand Morimoto

This is the eBook version of the printed book.

With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption...


Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training,...


CompTIA Network+ Certification Study Guide 2E: Exam N10-004

by Robert Shimonski

CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major...


Cyber Attacks: Protecting National Infrastructure

by Edward Amoroso

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent...


CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...


Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

by Terrence V. Lillard

Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network...


A Guide to Kernel Exploitation: Attacking the Core

by Enrico Perla & Massimiliano Oldani

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the...


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm & Jason Andress

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests...


Geekonomics: The Real Cost of Insecure Software

by David Rice

"The clarity of David's argument and the strength of his conviction are truly inspiring. If you don't believe the world of software affects the world in which you live, you owe it to yourself to read this book."...


Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

by Will Gragido & John Pirc

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry....