Computers / System Administration

Best Selling / Page 16

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (312)

Windows Administration (25)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (398)

French (11)

German (1)

Spanish (3)

Italian (7)

 

Protection

All (398)

DRM Free (72)

DRM (326)

More options

DB2 9.7 for Linux, UNIX, and Windows Database Administration: Certification Study Notes

by Roger E. Sanders

The relational database-management system DB2 9.7 is given detailed and comprehensive treatment in this exam-preparation resource. Compiled from presentation material used in the popular “Crammer Course”...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from...


Kismet Hacking

by Frank Thornton, Michael J. Schearer & Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking...


Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD

by Johnny Long, Ryan Russell & Timothy Mullen

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no...


The IT Regulatory and Standards Compliance Handbook:: How to Survive Information Systems Audit and Assessments

by Craig S. Wright

This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both...


Mastering Windows Network Forensics and Investigation

by Steven Anson, Steve Bunting & Ryan Johnson

An authoritative guide to investigating high-technology crimes

Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This...


Microsoft Virtualization Secrets

by John Savill

Unbeatable advice and expert tips for evaluating, designing, and deploying virtualization solutions

If you're an IT professional, you know that virtualization is essential in today's computer infrastructures....


The Computer Incident Response Planning Handbook:  Executable Plans for Protecting Information at Risk

by N. K. McCarthy

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook:...


The Death of the Internet

by Markus Jakobsson

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure...


Modern Cryptanalysis: Techniques for Advanced Code Breaking

by Christopher Swenson

As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis...


Reverse Deception: Organized Cyber Threat Counter-Exploitation

by Sean Bodmer & Dr Max Kilger

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced...


Snort Intrusion Detection and Prevention Toolkit

by Brian Caswell, Jay Beale & Andrew Baker

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort...


The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator

by Dave Kleiman

This is the official CHFI study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and to properly gather the necessary evidence...


Configuring Juniper Networks NetScreen & SSG Firewalls

by Rob Cameron, Chris Cantrell & Anne Hemni

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will...


Incident Response & Computer Forensics, 2nd Ed.

by Kevin Mandia & Chris Prosise

Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation,...


Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions

by David Pollino & Bill Pennington

The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security

Every day, hackers are devising new ways to break into your network. Do you...


Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP

by Greg Witte & Melanie Cook

Master the latest digital security automation technologies

Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security...


IBM i Security Administration and Compliance

by Carol Woodbury

Explaining the importance of developing a security policy and detailing how to implement and maintain such a system, this guide reviews IBM i security and the way it functions within IBM i systems. Written in...


Identity Management: A Primer

by Ilan Sharoni, Kent Spaulding & Graham Williamson

In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and...


FISMA Certification and Accreditation Handbook

by L. Taylor

The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.

This book will explain what is meant by Certification and Accreditation and why the process...