Computers / System Administration / Security

Best Selling / Page 6

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (313)

French (8)

German (1)

Spanish (0)

Italian (5)

 

Protection

All (313)

DRM Free (49)

DRM (264)

More options

CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The 10 domains are covered completely and as concisely as possible with...


Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

Security is a growing duty of the everyday system administrator. While there are certifications and specialized (expensive) training classes, there is not a go-to-off-the-shelf resource to tackle these obstacles....


XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

by Steven Bolt

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the...


Instant Metasploit Starter

by Ranganath Karthik

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Instant Metasploit Starter is a fast-paced introductory...


No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

by Johnny Long & Kevin D. Mitnick

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority...


The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator

by Dave Kleiman

This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints...


CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

by Robert Shimonski, Naomi Alpern & Michael Cross

CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on...


A Guide to Kernel Exploitation: Attacking the Core

by Enrico Perla & Massimiliano Oldani

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

by Gareth R. James

Finally, a book to guide you through the tasks of implementing XenDesktop for your company. Citrix XenDesktop Implementation is aimed to specifically address how to implement a Virtual Desktop Infrastructure...


Managed Code Rootkits: Hooking into Runtime Environments

by Erez Metula

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer....


Metrics and Methods for Security Risk Management

by Carl Young

Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic...


Instant CloudFlare Starter

by Dickey Jeff

Written as a practical guide, CloudFlare Starter will show you all you need to know in order to effectively improve your online presence in a multitude of different ways."CloudFlare Starter" is a practical yet...


Active Directory Cookbook

by Brian Svidergol & Robbie Allen

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common...


How to Cheat at Windows System Administration Using Command Line Scripts

by Pawan K Bhardwaj

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command...


The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

by Robert Shimonski

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost...


Cryptography for Developers

by Tom St Denis

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second...


Internet Security: A Jumpstart for Systems Administrators and IT Managers

by Tim Speed & Juanita Ellis

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.

New methods...


Stealing the Network: How to Own a Shadow

by Johnny Long, Timothy Mullen & Ryan Russell

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth...


Mastering FreeBSD and OpenBSD Security

by Yanek Korff, Paco Hope & Bruce Potter

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can...