Computers / System Administration / Security

Best Selling / Page 7

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (320)

French (8)

German (1)

Spanish (0)

Italian (6)

 

Protection

All (320)

DRM Free (46)

DRM (274)

More options

Managed Code Rootkits: Hooking into Runtime Environments

by Erez Metula

Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The...


Metrics and Methods for Security Risk Management

by Carl Young

Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information...


Instant CloudFlare Starter

by Dickey Jeff

Written as a practical guide, CloudFlare Starter will show you all you need to know in order to effectively improve your online presence in a multitude of different ways."CloudFlare Starter" is a practical yet...


Active Directory Cookbook

by Brian Svidergol & Robbie Allen

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common...


How to Cheat at Windows System Administration Using Command Line Scripts

by Pawan K Bhardwaj

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command...


The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

by Robert Shimonski

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost...


Cryptography for Developers

by Tom St Denis

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second...


Internet Security: A Jumpstart for Systems Administrators and IT Managers

by Tim Speed & Juanita Ellis

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.

New methods...


Stealing the Network: How to Own a Shadow

by Johnny Long, Timothy Mullen & Ryan Russell

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth...


Mastering FreeBSD and OpenBSD Security

by Yanek Korff, Paco Hope & Bruce Potter

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can...


Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training

by Peter Trim & David Upton

Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena....


Security + Study Guide and DVD Training System

by Syngress

Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential?

Thanks to soaring e-business...


Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

by Josh More

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork...


Sniffer Pro Network Optimization & Troubleshooting Handbook

by Syngress

The only book dedicated Sniffer, a powerful tool created for real-time enterprise network fault diagnosis and performance management.

Sniffer Network Optimization and Troubleshooting Handbook introduces the...


Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL

by XYPRO Technology Corp

Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments,...


Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

by Derrick Rountree

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical,...


Bring Your Own Device (BYOD) to Work: Trend Report

by Bob Hayes & Kathleen Kotwica

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones,...


Dr. Tom Shinder's Configuring ISA Server 2004

by Debra Littlejohn Shinder & Thomas W Shinder

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured...


InfoSec Career Hacking: Sell Your Skillz, Not Your Soul: Sell Your Skillz, Not Your Soul

by Chris Hurley, Johnny Long & Aaron W Bayles

"InfoSec Career Hacking” starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer,...


Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

by Lee Barken

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers...