Computers / System Administration

Best Selling / Page 16

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (320)

Windows Administration (25)

Linux & UNIX Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (411)

French (12)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (411)

DRM Free (68)

DRM (343)

More options

Hardening Cisco Routers

by Thomas Akin

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature...


Network Security Assessment: Know Your Network

by Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in...


Securing Ajax Applications: Ensuring the Safety of the Dynamic Web

by Christopher Wells

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security...


A+, Network+, Security+ Exams in a Nutshell: A Desktop Quick Reference

by Pawan K. Bhardwaj

If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready...


Client-Side Attacks and Defense

by Sean-Philip Oriyano & Robert Shimonski

Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including,...


Microsoft Windows PowerShell 3.0 Firstlook

by Adam Driscoll

This book groups features into logical chapters by topic. Each feature is fully explained, with relevant background information, and simple examples. Administrators or power users looking to quickly learn and...


Microsoft System Center 2012 Endpoint Protection Cookbook

by Andrew James Plue

Microsoft System Center 2012 Endpoint Protection Cookbook is a highly practical cookbook for beginner-intermediate use to get you started with a variety of SCEP tasks, as well as providing a sneak peek at a...


Microsoft Forefront Identity Manager 2010 R2 Handbook

by Kent Nordström

Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from...


OpenStack Cloud Computing Cookbook

by Kevin Jackson

A Cookbook full of practical and applicable recipes that will enable you to use the full capabilities of OpenStack like never before. This book is aimed at system administrators and technical architects moving...


Network Security A Beginner's Guide 3/E

by Eric Maiwald

Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than...


Hacking Web Apps: Detecting and Preventing Web Application Security Problems

by Mike Shema

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of...


Mahara ePortfolios: Beginner's Guide

by Derrin Kent

This book will provide you with step-by-step instructions to get started with Mahara and create an impressive electronic portfolio. The book is packed with many useful examples and screenshots for easy and quick...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams & Anton Chuvakin

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the...


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

by Deviant Ollam

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that...


DB2 9.7 for Linux, UNIX, and Windows Database Administration: Certification Study Notes

by Roger E. Sanders

The relational database-management system DB2 9.7 is given detailed and comprehensive treatment in this exam-preparation resource. Compiled from presentation material used in the popular “Crammer Course”...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from...


Kismet Hacking

by Frank Thornton, Michael J. Schearer & Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking...


Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD

by Johnny Long, Ryan Russell & Timothy Mullen

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no...


The IT Regulatory and Standards Compliance Handbook:: How to Survive Information Systems Audit and Assessments

by Craig S. Wright

This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both...