Computers / System Administration / Security

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete Security

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (317)

French (8)

German (1)

Spanish (0)

Italian (7)

 

Protection

All (317)

DRM Free (46)

DRM (271)

More options

CompTIA Security+ All-in-One Exam Guide, Third Edition (Exam SY0-301)

by Wm. Arthur Conklin & Gregory White

Co-written by leading IT security experts, this new edition offers up-to-date, authoritative coverage of the CompTIA Security+ exam.

CompTIA Security+ All-in-One Exam Guide, Third Edition covers all of the objectives...


Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

by Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


Dissecting the Hack: The F0rb1dd3n Network: The F0rb1dd3n Network

by Jayson E Street, Kent Nabors & Brian Baskin

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

by Gareth R. James

Finally, a book to guide you through the tasks of implementing XenDesktop for your company. Citrix XenDesktop Implementation is aimed to specifically address how to implement a Virtual Desktop Infrastructure...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on...


Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

by Steven Levy

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes...


Guide to Windows 8 - Not 4 Geeks

by Christian Schönberger

Every new version of Windows is more complex than the older versions. Even if the newer version contains a dozen new wizards and other helps, an average user needs more and more time to learn how to use the...


Kerberos: The Definitive Guide: The Definitive Guide

by Jason Garman

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system...


Hacking Exposed 7: Network Security Secrets and Solutions

by Stuart McClure & Joel Scambray

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and...


Securing the Cloud: Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


Seven Deadliest USB Attacks

by Brian Anderson & Barbara Anderson

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally...


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

by William L. Simon, Kevin Mitnick & Steve Wozniak

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting...


Hacking Wireless Networks for Dummies

by Peter T. Davis, Kevin Beaver & Devin K. Akin

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."

--Devin Akin - CTO, The Certified Wireless...


Social Engineering: The Art of Human Hacking

by Christopher Hadnagy & Paul Wilson

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed...


Security 2020: Reduce Security Risks This Decade

by Doug Howard & Kevin Prince

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security...


Network Security Bible

by Eric Cole

The comprehensive A-to-Z guide on network security, fully revised and updated

Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments....


Security Engineering: A Guide to Building Dependable Distributed Systems

by Ross J. Anderson

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online...


Cryptography Engineering: Design Principles and Practical Applications

by Niels Ferguson, Bruce Schneier & Tadayoshi Kohno

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and...


IP Address Management Principles and Practice

by Timothy Rooney

This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services,...


CompTIA Security+ Deluxe Study Guide: SY0-201

by Emmett Dulaney

CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn...