Computers / System Administration

Best Selling / Page 15

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (312)

Windows Administration (25)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (398)

French (11)

German (1)

Spanish (3)

Italian (7)

 

Protection

All (398)

DRM Free (72)

DRM (326)

More options

Web Security, Privacy & Commerce

by Simson Garfinkel & Gene Spafford

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats...


Database Nation: The Death of Privacy in the 21st Century

by Simson Garfinkel

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain...


Managing Security with Snort & IDS Tools

by Kerry J. Cox & Christopher Gerg

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from...


Security Warrior

by Cyrus Peikari & Anton Chuvakin

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the...


Network Security with Openssl: Cryptography for Secure Communications

by John Viega, Matt Messier & Pravir Chandra

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version...


Hardening Cisco Routers

by Thomas Akin

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature...


Network Security Assessment: Know Your Network

by Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in...


Securing Ajax Applications: Ensuring the Safety of the Dynamic Web

by Christopher Wells

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security...


A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference

by Pawan K. Bhardwaj

If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready...


Client-Side Attacks and Defense

by Sean-Philip Oriyano & Robert Shimonski

Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user's...


Microsoft Windows PowerShell 3.0 Firstlook

by Adam Driscoll

This book groups features into logical chapters by topic. Each feature is fully explained, with relevant background information, and simple examples. Administrators or power users looking to quickly learn and...


Microsoft System Center 2012 Endpoint Protection Cookbook

by Andrew James Plue

Microsoft System Center 2012 Endpoint Protection Cookbook is a highly practical cookbook for beginner-intermediate use to get you started with a variety of SCEP tasks, as well as providing a sneak peek at a...


Microsoft Forefront Identity Manager 2010 R2 Handbook

by Kent Nordström

Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from...


OpenStack Cloud Computing Cookbook

by Kevin Jackson

A Cookbook full of practical and applicable recipes that will enable you to use the full capabilities of OpenStack like never before. This book is aimed at system administrators and technical architects moving...


Network Security A Beginner's Guide 3/E

by Eric Maiwald

Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than...


Hacking Web Apps: Detecting and Preventing Web Application Security Problems

by Mike Shema

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of...


Mahara ePortfolios: Beginner's Guide

by Derrin Kent

This book will provide you with step-by-step instructions to get started with Mahara and create an impressive electronic portfolio. The book is packed with many useful examples and screenshots for easy and quick...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams & Anton Chuvakin

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the...


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

by Deviant Ollam

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that...