Computers / System Administration / Security

Best Selling / Page 8

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (312)

French (8)

German (1)

Spanish (0)

Italian (6)

 

Protection

All (312)

DRM Free (49)

DRM (263)

More options

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

by Eric D. Knapp & Raj Samani

Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies...


Schneier on Security

by Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses...


Enterprise Security: A Data-Centric Approach to Securing the Enterprise

by Woody Aaron

It's a reference guide to enterprise security programs. This book is intended for the IT security staff beginner to expert but would also be a valuable resource for other IT functions such as IT compliance,...


Instant Citrix Security How-to

by Jacob Carmel

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich...


Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

by Brett Shavers

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book...


Linux Security Cookbook

by Daniel J. Barrett, Richard E. Silverman & Robert G. Byrnes

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing...


Botnets: The Killer Web Applications

by Craig Schiller & James R. Binkley

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how...


Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems

by Shuangbao Paul Wang & Robert S. Ledley

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a...


Using Social Media for Global Security

by Ravi Gupta & Hugh Brooks

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social...


Hacking For Dummies

by Kevin Beaver

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own...


Public Key Cryptography: Applications and Attacks

by Lynn Margaret Batten

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces...


SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices

by Joey Hirao

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail,...


Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

by Jesse Varsalone

This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of...


UNIX and Linux Forensic Analysis DVD Toolkit

by Chris Pogue, Cory Altheide & Todd Haverkos

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report,...


E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

by Karen A. Schuler

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information...


Netcat Power Tools

by Jan Kanclirz

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol...


Nokia Firewall, VPN, and IPSO Configuration Guide

by Andrew Hay, Keli Hay & Peter Giannoulis

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."...


Disappearing Cryptography: Information Hiding: Steganography & Watermarking

by Peter Wayner

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver...


Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

by John Hoopes

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security...


Securing Citrix XenApp Server in the Enterprise

by Tariq Azad

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and...