Computers / System Administration / Security

Best Selling / Page 3

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (320)

French (8)

German (1)

Spanish (0)

Italian (6)

 

Protection

All (320)

DRM Free (46)

DRM (274)

More options

Geekonomics: The Real Cost of Insecure Software

by David Rice

"The clarity of David's argument and the strength of his conviction are truly inspiring. If you don't believe the world of software affects the world in which you live, you owe it to yourself to read this book."...


Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

by Will Gragido & John Pirc

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry....


Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

by Dustin Hannifin

The Microsoft Windows Server 2008 R2 Administrator's Reference is the essential guide to deploying, configuring, and administering a Windows Server 2008 R2 infrastructure. This book includes in-depth discussions...


Securing SQL Server: Protecting Your Database from Attackers

by Denny Cherry

There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will...


Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava & Gareth Heyes

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if...


Computer and Information Security Handbook

by John R. Vacca

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Social Engineering in IT Security: Tools, Tactics, and Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering...


Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

by Harlan Carvey

Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


2014 Car Hacker's Manual

by Craig Smith

As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable,...


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


Comptia Security+study Guide: Exam Sy0-201

by Emmett Dulaney

Comprehensive Coverage to Help You Prepare for the SY0-201 Exam and Beyond

This CompTIA Authorized Study Guide provides complete coverage of the objectives for CompTIA's Security+ Exam (SY0-201), with clear and...


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

by Harlan Carvey

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free...


The Essential Guide to Home Computer Security

by Robert R. Rowlingson

For the non-technical home and small-office internet user, this guide teaches "digital commonsense". The reader will learn easy-to-implement, cost-effective ways of protecting their children, finances, privacy,...


Mobile Computing: Securing Your Workforce

by BCS The Chartered Institute for IT

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly...