Computers / System Administration

Best Selling / Page 15

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (313)

Linux & UNIX Administration (25)

Windows Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (402)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (402)

DRM Free (74)

DRM (328)

More options

Computer Security Basics

by Rick Lehtinen & G. T., Sr. Gangemi

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult....


Privacy and Big Data

by Mary E. Ludloff & Terence Craig

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more....


Managing Infrastructure with Puppet

by James Loope

Get started with Puppet, and learn how this popular configuration management framework helps you automate your servers. This concise introduction shows you how to use Puppet’s tools and templates to organize...


Practical UNIX and Internet Security

by Simson Garfinkel, Gene Spafford & Alan Schwartz

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The...


DNS and BIND on IPv6

by Cricket Liu

If you're preparing to roll out IPv6 on your network, this concise book provides the essentials you need to support this protocol with DNS. You'll learn how DNS was extended to accommodate IPv6 addresses, and...


Asterisk: The Definitive Guide

by Leif Madsen, Jim Van Meggelen & Russell Bryant

Design a complete VoIP or analog PBX with Asterisk, even if you have no previous Asterisk experience and only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap...


Web Security, Privacy & Commerce

by Simson Garfinkel & Gene Spafford

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats...


Database Nation: The Death of Privacy in the 21st Century

by Simson Garfinkel

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain...


Managing Security with Snort & IDS Tools

by Kerry J. Cox & Christopher Gerg

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from...


Security Warrior

by Cyrus Peikari & Anton Chuvakin

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the...


Network Security with OpenSSL: Cryptography for Secure Communications

by John Viega, Matt Messier & Pravir Chandra

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version...


Hardening Cisco Routers

by Thomas Akin

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature...


Network Security Assessment: Know Your Network

by Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in...


Securing Ajax Applications: Ensuring the Safety of the Dynamic Web

by Christopher Wells

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security...


A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference

by Pawan K. Bhardwaj

If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready...


Client-Side Attacks and Defense

by Sean-Philip Oriyano & Robert Shimonski

Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's...


Microsoft Windows PowerShell 3.0 Firstlook

by Adam Driscoll

This book groups features into logical chapters by topic. Each feature is fully explained, with relevant background information, and simple examples. Administrators or power users looking to quickly learn and...


Microsoft System Center 2012 Endpoint Protection Cookbook

by Andrew James Plue

Microsoft System Center 2012 Endpoint Protection Cookbook is a highly practical cookbook for beginner-intermediate use to get you started with a variety of SCEP tasks, as well as providing a sneak peek at a...


Microsoft Forefront Identity Manager 2010 R2 Handbook

by Kent Nordström

Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from...


OpenStack Cloud Computing Cookbook

by Kevin Jackson

A Cookbook full of practical and applicable recipes that will enable you to use the full capabilities of OpenStack like never before. This book is aimed at system administrators and technical architects moving...