Computers / System Administration / Security

Best Selling / Page 5

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (320)

French (8)

German (1)

Spanish (0)

Italian (6)

 

Protection

All (320)

DRM Free (46)

DRM (274)

More options

SELinux System Administration

by Vermeulen Sven

A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the...


Mobile Security: How to Secure, Privatize, and Recover Your Devices

by Speed Tim, Nykamp Darla & Heiser Mari

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information...


Take Control of Your Online Privacy

by Joe Kissell

Learn what's private online (not much)--and what to do about it!

Updated March 19, 2014

Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just...


Android Application Security Essentials

by Rai Pragati Ogal

Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions...


How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access

by Henrik Walther

The Perfect Reference for the Multitasked System Administrators

The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security....


Digital Archaeology: The Art and Science of Digital Forensics

by Michael W. Graves

The Definitive, Up-to-Date Guide to Digital Forensics

 

The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital...


Cryptography InfoSec Pro Guide

by Sean-Philip Oriyano

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved...


Learning Metasploit Exploitation and Development

by Balapure Aditya

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated...


VMware View Security Essentials

by Langenhan Daniel

A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a "how-to" for the novice, a "reference guide" for the advanced user, and a "go to"...


Instant OSSEC Host-based Intrusion Detection

by Brad Lhotsky

Security software is often expensive, restricting, burdensome, and noisy. OSSEC-HIDS was designed to avoid getting in your way and to allow you to take control of and extract real value from industry security...


Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

by David Maynor

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion...


Applied Oracle Security: Developing Secure Database and Middleware Environments: Developing Secure Database and Middleware Environments

by David Knox, Scott Gaetjen & Hamza Jahangir

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments....


Instant Spring Security Starter

by Jagielski Piotr & Nabrdalik Jakub

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to-follow format following...


Cisa Certified Information Systems Auditor Study Guide

by David L. Cannon

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content...


Eleventh Hour Security+: Exam SY0-201 Study Guide

by Ido Dubrawsky

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam.

The book's 14 chapters provide in-depth discussions of the following topics:...


Dissecting the Hack: The F0rb1dd3n Network, Revised Edition: The F0rb1dd3n Network

by Jayson E Street, Kent Nabors & Brian Baskin

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network,” tells the fictional story of...


Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Un

by Cory Altheide & Harlan Carvey

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use...


Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

by Dustin Hannifin

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features;...


Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava & Gareth Heyes

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if...


Scene of the Cybercrime

by Debra Littlejohn Shinder & Michael Cross

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully...