Computers / System Administration

Best Selling / Page 15

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (350)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (444)

French (10)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (444)

DRM Free (69)

DRM (375)

More options

Cisco ASA Configuration

by Richard Deal

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication...


Windows Server 2012: Up and Running

by Samara Lynn

If your organization plans to move to a cloud infrastructure from a LAN or WAN, this book shows you how to do it efficiently with Windows Server 2012. Experienced Windows administrators will learn how to deploy,...


Monitoring with Ganglia

by Matt Massie, Bernard Li & Brad Nicholes

Written by Ganglia designers and maintainers, this book shows you how to collect and visualize metrics from clusters, grids, and cloud infrastructures at any scale. Want to track CPU utilization from 50,000...


Security Consulting

by Charles A. Sennewald

- The only book of its kind dedicated to beginning a security consulting practice from the ground-up

- Proven, practical methods to establish and run a security consulting business

- New chapters dedicated...


The Best Damn Windows Server 2008 Book Period

by Anthony Piltzecker

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.

This book will show you how to increase the reliability and flexibility of your server...


Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization

by Aaron Tiensivu

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and...


Next Generation SSH2 Implementation: Securing Data in Motion

by Dale Liu

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Anton Chuvakin & Branden R. Williams

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information, organized crime has made malware development...


Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

by Joe Fichera & Steven Bolt

Network Intrusion Analysis addresses the entire process of investigating a network intrusion.

*Provides a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion....


Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

by Mark Talabis & Jason Martin

Information Security Risk Assessment Toolkit gives you the tools and skills to complete a quick, reliable, and thorough risk assessment. This book helps to determine what assets need protection, what risks these...


Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets

by Information Security

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company...


Policing Cyber Hate, Cyber Threats and Cyber Terrorism

by Imran Awan & Brian Blakemore

This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. It also shows how this activity forms in our communities and what...


Oracle 11g Anti-hacker's Cookbook

by Adrian Neagu

This cookbook has recipes written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an Oracle Database Administrator, Security Manager or Security Auditor...


Take Control of Vmware Fusion 2

by Joe Kissell

Now that modern Macs use Intel processors, you can run Windows on your Mac without slowdowns or tradeoffs, and with the benefit of configuration snapshots, multiple installations, and the capability to mix Windows...


Beautiful Security: Leading Security Experts Explain How They Think

by Andy Oram & John Viega

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about,...


Security Monitoring

by Chris Fry & Martin Nystrom

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first...


ScreenOS Cookbook

by Stefan Brunner, Vik Davar & David Delcourt

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide...


Security Power Tools

by Bryan Burns, Dave Killion & Nicolas Beauchesne

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks'...


Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

by Paco Hope & Ben Walther

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers...


Digital Identity

by Phillip J. Windley

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on...