Computers / System Administration / Security

Best Selling / Page 7

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Language

English (359)

French (7)

German (15)

Spanish (0)

Italian (8)

 

Protection

All (359)

DRM Free (48)

DRM (311)

More options

Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training

by Peter Trim & David Upton

Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena....


Security + Study Guide and DVD Training System

by Syngress

Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business...


Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

by Josh More

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork...


Sniffer Pro Network Optimization & Troubleshooting Handbook

by Syngress

Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and...


Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL

by XYPRO Technology Corp

Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments,...


Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

by Derrick Rountree

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical,...


Bring Your Own Device (BYOD) to Work: Trend Report

by Bob Hayes & Kathleen Kotwica

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones,...


Dr. Tom Shinder's Configuring ISA Server 2004

by Debra Littlejohn Shinder & Thomas W Shinder

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured...


InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

by Chris Hurley, Johnny Long & Aaron W Bayles

"InfoSec Career Hacking” starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer,...


Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

by Lee Barken

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers...


Instant Apple Configurator How-to

by Edge Charles & Houston TJ

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich...


Snort Intrusion Detection 2.0

by Syngress

The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments.

Snort 2.0 Intrusion Detection is written by...


Hack Proofing Your Network 2E

by Syngress

A new edition the most popular Hack Proofing book around!

IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best...


E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

by Syngress

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later...


Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

by Eric Cole, Michael Nordfelt & Sandra Ring

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...


Host Integrity Monitoring Using Osiris and Samhain

by Brian Wotring

This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance,...


Hacking the Code: Auditor's Guide to Writing Secure Code for the Web

by Mark Burnett

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture...


Ethereal Packet Sniffing

by Syngress

This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal,...


BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic

by Tom St Denis

Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision....


The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

by Kevin D. Mitnick

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception

Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments...