Computers / System Administration / Security

Best Selling / Page 5

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (375)

French (7)

German (13)

Spanish (0)

Italian (6)

 

Protection

All (375)

DRM Free (47)

DRM (328)

More options

Professional Penetration Testing: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before...


Unified Communications Forensics: Anatomy of Common UC Attacks

by Nicholas Mr. Grant & Joseph II Shaw

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish...


Computer and Information Security Handbook

by John R. Vacca

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory,...


Social Media Security: Leveraging Social Networking While Mitigating Risk

by Michael Cross

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking...


Introduction to Information Security: A Strategic-Based Approach

by Timothy Shimeall & Jonathan Spring

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing...


Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

by David Lilburn Watson & Andrew Jones

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance,...


The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

by Denny Cherry

Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy....


Cyber Security and IT Infrastructure Protection

by John R. Vacca

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established...


Cloud Storage Forensics

by Darren Quick, Ben Martini & Raymond Choo

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations...


Information Protection Playbook

by Greg Kane & Lorna Koppel

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost....


The Basics of IT Audit: Purposes, Processes, and Practical Information

by Stephen D. Gantz

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing...


Eleventh Hour CISSP: Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for...


Network and System Security

by John R. Vacca

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored...


Managing Information Security

by John R. Vacca

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention...


The Basics of Web Hacking: Tools and Techniques to Attack the Web

by Josh Pauli

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance"...


Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

by Jason Andress & Steve Winterfeld

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all...


X-Ways Forensics Practitioner's Guide

by Brett Shavers & Eric Zimmerman

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array...


Business Continuity and Disaster Recovery Planning for IT Professionals

by Susan Snedaker

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines...


Practical Anonymity: Hiding in Plain Sight Online

by Peter Loshin

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees...


Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

by Todd G. Shipley & Art Bowker

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable...