Computers / System Administration / Security

Best Selling / Page 6

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (320)

French (8)

German (1)

Spanish (0)

Italian (6)

 

Protection

All (320)

DRM Free (46)

DRM (274)

More options

Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

by Timothy "Thor" Mullen

Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains...


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm & Jason Andress

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical...


Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

by Diane Barrett & Greg Kipper

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments provides an introduction to virtualized environments and their implications on forensic investigations. It emphasizes...


Securing the Cloud: Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom

by Larry Daniel & Lars Daniel

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics experts,...


Google Hacking for Penetration Testers

by Johnny Long

This book helps people find sensitive information on the Web.

Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's...


Snort Intrusion Detection and Prevention Toolkit

by Brian Caswell, Jay Beale & Andrew Baker

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for...


Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

by Harlan Carvey

Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams, Anton Chuvakin & Tony Bradley

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development...


Cyber Attacks: Protecting National Infrastructure

by Edward Amoroso

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification. The exam is designed to ensure that someone...


Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection...


XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

by Steven Bolt

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the...


Instant Metasploit Starter

by Ranganath Karthik

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Instant Metasploit Starter is a fast-paced introductory...


No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

by Johnny Long & Kevin D. Mitnick

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority...


The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator

by Dave Kleiman

This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints...


CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

by Robert Shimonski, Naomi Alpern & Michael Cross

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

Practical Lock Picking: A Physical Penetration Tester's Training Guide provides an introduction to the basic principles of lock picking. It combines both easy-to-follow, step-by-step lessons, and tutorials that...


A Guide to Kernel Exploitation: Attacking the Core

by Enrico Perla & Massimiliano Oldani

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

by Gareth R. James

Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation...