Computers / System Administration / Security

Best Selling / Page 8

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (301)

French (8)

German (1)

Spanish (0)

Italian (3)

 

Protection

All (301)

DRM Free (49)

DRM (252)

More options

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices

by Joey Hirao

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail,...


Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

by Jesse Varsalone

This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of...


UNIX and Linux Forensic Analysis DVD Toolkit

by Chris Pogue, Cory Altheide & Todd Haverkos

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report,...


E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

by Karen A. Schuler

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information...


Netcat Power Tools

by Jan Kanclirz

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol...


Nokia Firewall, VPN, and IPSO Configuration Guide

by Andrew Hay, Keli Hay & Peter Giannoulis

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."...


Disappearing Cryptography: Information Hiding: Steganography & Watermarking

by Peter Wayner

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver...


Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

by John Hoopes

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security...


Securing Citrix XenApp Server in the Enterprise

by Tariq Azad

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and...


Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure

by Jack Wiles, Ted Claypoole & Phil Drake

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment,...


Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

by Thomas Olzak, James Sabovik & Jason Boomer

Virtualization technologies help IT organizations in three ways: cost-cutting, ease of administration, and the overall effect of IT on the environment. Virtualization cuts costs by reducing the amount of capital...


Mobile Malware Attacks and Defense

by Ken Dunham

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware...


Implementing SSL / Tls Using Cryptography and Pki

by Joshua Davies

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure...


BackTrack 5 Cookbook

by Pritchett Willie & David De Smet

This is a cookbook with the necessary explained commands and code to learn BackTrack thoroughly. It smoothes your learning curve through organized recipes,This book is for anyone who desires to come up to speed...


Spring Security 3.1

by Winch Robert & Mularien Peter

This practical step-by-step tutorial has plenty of example code coupled with the necessary screenshots and clear narration so that grasping content is made easier and quicker,This book is intended for Java web...


sendmail

by Bryan Costales, Claus Assmann & George Jansen

A classic O'Reilly title since 1993, sendmail now covers Versions 8.10 through 8.14 of this email routing program, including dozens of new features, options, and macros. This edition also takes a more nuts-and-bolts...


Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

by Brett Shavers

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and...


Federal Cloud Computing: The Definitive Guide for Cloud Service Providers

by Matthew Metheny

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing...


Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

by Brett Shavers

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case...


Blackhatonomics: An Inside Look at the Economics of Cybercrime

by Will Gragido, Daniel Molina & John Pirc

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic...