Computers / System Administration

Best Selling / Page 16

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (317)

Linux & UNIX Administration (24)

Windows Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (406)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (406)

DRM Free (68)

DRM (338)

More options

Microsoft Windows PowerShell 3.0 Firstlook

by Adam Driscoll

This book groups features into logical chapters by topic. Each feature is fully explained, with relevant background information, and simple examples. Administrators or power users looking to quickly learn and...


Microsoft System Center 2012 Endpoint Protection Cookbook

by Andrew James Plue

Microsoft System Center 2012 Endpoint Protection Cookbook is a highly practical cookbook for beginner-intermediate use to get you started with a variety of SCEP tasks, as well as providing a sneak peek at a...


Microsoft Forefront Identity Manager 2010 R2 Handbook

by Kent Nordström

Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from...


OpenStack Cloud Computing Cookbook

by Kevin Jackson

A Cookbook full of practical and applicable recipes that will enable you to use the full capabilities of OpenStack like never before. This book is aimed at system administrators and technical architects moving...


Network Security A Beginner's Guide 3/E

by Eric Maiwald

Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than...


Hacking Web Apps: Detecting and Preventing Web Application Security Problems

by Mike Shema

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of...


Mahara ePortfolios: Beginner's Guide

by Derrin Kent

This book will provide you with step-by-step instructions to get started with Mahara and create an impressive electronic portfolio. The book is packed with many useful examples and screenshots for easy and quick...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams & Anton Chuvakin

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the...


Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

by Deviant Ollam

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that...


DB2 9.7 for Linux, UNIX, and Windows Database Administration: Certification Study Notes

by Roger E. Sanders

The relational database-management system DB2 9.7 is given detailed and comprehensive treatment in this exam-preparation resource. Compiled from presentation material used in the popular “Crammer Course”...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from...


Kismet Hacking

by Frank Thornton, Michael J. Schearer & Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking...


Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD

by Johnny Long, Ryan Russell & Timothy Mullen

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no...


The IT Regulatory and Standards Compliance Handbook:: How to Survive Information Systems Audit and Assessments

by Craig S. Wright

This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both...


Mastering Windows Network Forensics and Investigation

by Steven Anson, Steve Bunting & Ryan Johnson

An authoritative guide to investigating high-technology crimes

Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This...


Microsoft Virtualization Secrets

by John Savill

Unbeatable advice and expert tips for evaluating, designing, and deploying virtualization solutions

If you're an IT professional, you know that virtualization is essential in today's computer infrastructures....


The Computer Incident Response Planning Handbook:  Executable Plans for Protecting Information at Risk

by N. K. McCarthy

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook:...


The Death of the Internet

by Markus Jakobsson

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure...


Modern Cryptanalysis: Techniques for Advanced Code Breaking

by Christopher Swenson

As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis...