Computers / System Administration

Best Selling / Page 16

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (350)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (444)

French (10)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (444)

DRM Free (69)

DRM (375)

More options

Security and Usability: Designing Secure Systems That People Can Use

by Lorrie Faith Cranor & Simson Garfinkel

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often...


Windows XP Hacks: Tips & Tools for Customizing and Optimizing Your OS

by Preston Gralla

A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes...


Essential SNMP

by Douglas Mauro & Kevin Schmidt

Simple Network Management Protocol (SNMP) provides a "simple" set of operations that allows you to more easily monitor and manage network devices like routers, switches, servers, printers, and more. The information...


Snort Cookbook

by Angela Orebaugh, Simon Biles & Jacob Babbin

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting...


Windows Server 2003 Security Cookbook: Security Solutions and Scripts for System Administrators

by Mike Danseglio & Robbie Allen

In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid,...


Essential PHP Security

by Chris Shiflett

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other...


Junos Security

by Rob Cameron, Brad Woodberg & Patricio Giecco

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating...


RADIUS: Securing Public Access to Private Resources

by Jonathan Hassell

The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication...


LPI Linux Certification in a Nutshell

by Adam Haeder, Stephen Addison Schneiter & Bruno Gomes Pessanha

Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institute (LPI),...


Intellectual Property and Open Source: A Practical Guide to Protecting Code

by Van Lindberg

"Clear, correct, and deep, this is a welcome addition to discussions of law and computing for anyone -- even lawyers!"-- Lawrence Lessig, Professor of Law at Stanford Law School and founder of the Stanford Center...


Windows 7 Annoyances: Tips, Secrets, and Solutions

by David A. Karp

Windows 7 may be faster and more stable than Vista, but it's a far cry from problem-free. David A. Karp comes to the rescue with the latest in his popular Windows Annoyances series. This thorough guide gives...


Java Cryptography

by Jonathan Knudsen

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These...


Internet Forensics

by Robert Jones

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere...


Windows 7: The Missing Manual

by David Pogue

In early reviews, geeks raved about Windows 7. But if you're an ordinary mortal, learning what this new system is all about will be challenging. Fear not: David Pogue's Windows 7: The Missing Manual comes to...


Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance

by Tim Mather, Subra Kumaraswamy & Shahed Latif

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll...


Hacking: The Next Generation: The Next Generation

by Nitesh Dhanjani, Billy Rios & Brett Hardin

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques...


JUNOS Enterprise Switching

by Harry Reynolds & Doug Marschke

JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of...


Sakai OAE Deployment and Management: Open Source Collaboration and Learning for Higher Education

by Max Whitney

The Sakai Open Academic Environment (OAE) provides a unique collaboration system for university campuses: a social network that helps students discuss class materials, pursue research, communicate with faculty,...


Learning CFEngine 3: Automated system administration for sites of any size

by Diego Zamboni

Get up to speed on CFEngine 3, the open source configuration management software that enables you to automate everything from one-server shops to enterprise computer networks. This hands-on introduction shows...


Inside Cyber Warfare: Mapping the Cyber Underworld

by Jeffrey Carr

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber...