Computers / System Administration / Security

Best Selling / Page 4

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (313)

French (8)

German (1)

Spanish (0)

Italian (5)

 

Protection

All (313)

DRM Free (49)

DRM (264)

More options

Anti-Hacker Tool Kit, Fourth Edition

by Mike Shema

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range...


Carry On: Sound Advice from Schneier on Security

by Bruce Schneier

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance....


Node Security

by Barnes Dominic

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using...


Instant Windows PowerShell

by Menon Vinith

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the...


Metasploit Penetration Testing Cookbook, Second Edition

by Monika Agarwal & Abhinav Singh

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy...


Network Security Tools: Writing, Hacking, and Modifying Security Tools

by Nitesh Dhanjani & Justin Clarke

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more...


Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

by Thomas J. Mowbray

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats,...


Cuckoo Malware Analysis

by Oktavianto Digit & Muhardianto Iqbal

This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo...


Take Control of 1password

by Joe Kissell

Updated May 20, 2014

Speed through Web logins with 1Password 4!

Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe...


IBM Mainframe Security: Beyond the Basics-A Practical Guide from A Z/OS and Racf Perspective

by Dinesh D. Dattani

Rather than rehashing basic information—such as command syntax—already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance,...


SELinux System Administration

by Vermeulen Sven

A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the...


Mobile Security: How to Secure, Privatize, and Recover Your Devices

by Speed Tim, Nykamp Darla & Heiser Mari

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information...


Take Control of Your Online Privacy

by Joe Kissell

Learn what's private online (not much)--and what to do about it!

Updated March 19, 2014

Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just...


Android Application Security Essentials

by Rai Pragati Ogal

Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions...


How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access

by Henrik Walther

The Perfect Reference for the Multitasked System Administrators

The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security....


Digital Archaeology: The Art and Science of Digital Forensics

by Michael W. Graves

The Definitive, Up-to-Date Guide to Digital Forensics

 

The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital...


Cryptography InfoSec Pro Guide

by Sean-Philip Oriyano

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved...


Learning Metasploit Exploitation and Development

by Balapure Aditya

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated...


VMware View Security Essentials

by Langenhan Daniel

A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a "how-to" for the novice, a "reference guide" for the advanced user, and a "go to"...


Instant OSSEC Host-based Intrusion Detection

by Brad Lhotsky

Security software is often expensive, restricting, burdensome, and noisy. OSSEC-HIDS was designed to avoid getting in your way and to allow you to take control of and extract real value from industry security...