Computers / System Administration

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (360)

Linux & UNIX Administration (45)

Windows Administration (33)

 

Language

English (507)

French (12)

German (40)

Spanish (7)

Italian (9)

 

Protection

All (507)

DRM Free (71)

DRM (436)

More options

CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition

by Wm. Arthur Conklin & Gregory White

Official CompTIA Content! Prepare for CompTIA Security+ Exam SY0-301 with McGraw-Hill-a Gold-Level CompTIA Authorized Partner offering Official CompTIA Approved Quality Content to give you the competitive edge...


Linux Shell Scripting Cookbook, Second Edition

by Tushar Shantanu & Lakshman Sarath

This book is written in a Cookbook style and it offers learning through recipes with examples and illustrations. Each recipe contains step-by-step instructions about everything necessary to execute a particular...


Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

by Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

by Steven Levy

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes...


Cyber Hacking

by Scientific American Editors

Cyber Hacking: Wars in Virtual Space by the editors of Scientific American

Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is...


Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices

by Max Schubert, Derrick Bennett & Jonathan Gines

The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new...


Linux Mint System Administrator's Beginner's Guide

by Montoro Arturo Fernandez

A concise Packt Beginner's Guide to get you started with administering a Linux Mint system. This book is for those users who want to become Linux Mint system administrators and need to start learning quickly....


Guide to Windows 8 - Not 4 Geeks

by Christian Schönberger

Every new version of Windows is more complex than the older versions. Even if the newer version contains a dozen new wizards and other helps, an average user needs more and more time to learn how to use the...


Beautiful Security: Leading Security Experts Explain How They Think

by Andy Oram & John Viega

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about,...


Kerberos: The Definitive Guide: The Definitive Guide

by Jason Garman

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system...


Linux iptables Pocket Reference

by Gregor N. Purdy

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables...


Hacking Exposed 7: Network Security Secrets and Solutions

by Stuart McClure & Joel Scambray

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and...


OpenNebula 3 Cloud Computing

by Giovanni Toraldo

This is a step-by-step practical guide to get you started easily with openNebula. It guides you to build, maintain, and configure your cloud infrastructure, providing real-world examples in a simple and coherent...


JBoss AS 7 Configuration, Deployment and Administration

by Francesco Marchioni

You will be guided through setting up a JBoss application server in a logical order, with plenty of screenshots and practical instructions to help. Java system administrators, developers, and application testers...


Seven Deadliest USB Attacks

by Brian Anderson & Barbara Anderson

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally...


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

by William L. Simon, Kevin Mitnick & Steve Wozniak

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting...


Information Risk Management: A practitioner's guide

by David Sutton

Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development...


Problem Management: An implementation guide for the real world

by Michael G. Hall

Problem management is the IT service management process that tends to return more benefits more quickly than any of the others. This book offers real-world guidance on all aspects of implementing and running...


Burp Suite Essentials

by Mahajan Akash

If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic...


Oracle Database 12c Security

by Scott Gaetjen, David Knox & William Maroulis

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing,...