Computers / System Administration

Best Selling / Page 4

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (316)

Windows Administration (24)

Linux & UNIX Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (405)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (405)

DRM Free (68)

DRM (337)

More options

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7

Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Ocp Upgrade to Oracle Database 12c Exam Guide (Exam 1z0-060)

by Sam R. Alapati

A Fully Integrated Study System for OCP Exam 1Z0-060

Prepare for the Oracle Certified Professional Upgrade to Oracle Database 12c exam with this exclusive Oracle Press guide. Each chapter features step-by-step...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


AutoIt v3: Your Quick Guide

by Andy Flesner

AutoIt is becoming increasingly popularin the system administration field as atool for automating administrative tasks.Although this is one of its more popularuses, you can use AutoIt to automateanything in...


Oracle WebLogic Server 12c Administration Handbook

by Sam R. Alapati

Best Practices for Oracle WebLogic Server 12c Configuration and Administration

Maintain a high-performance enterprise application framework using the detailed information in this authoritative resource. Through...


Comptia Security+study Guide: Exam Sy0-201

by Emmett Dulaney

Comprehensive Coverage to Help You Prepare for the SY0-201 Exam and Beyond

This CompTIA Authorized Study Guide provides complete coverage of the objectives for CompTIA's Security+ Exam (SY0-201), with clear and...


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

by Harlan Carvey

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free...


IT Service Management: A guide for ITIL Foundation Exam candidates

by Ernest Brewster, Richard Griffiths & Aidan Lawes

ITIL® is a framework for IT service management and provides best management practice to meet ISO/IEC 20k. This guide introduces ITIL to Foundation Exam candidates and offers a practical understanding of IT...


The Essential Guide to Home Computer Security

by Robert R. Rowlingson

For the non-technical home and small-office internet user, this guide teaches "digital commonsense". The reader will learn easy-to-implement, cost-effective ways of protecting their children, finances, privacy,...


Mobile Computing: Securing Your Workforce

by BCS The Chartered Institute for IT

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly...


Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions

by Stuart McClure, Joel Scambray & George Kurtz

The tenth anniversary edition of the world's bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most...


Network Security: The Complete Reference

by Roberta Bragg, Mark Rhodes-Ousley & Keith Strassberg

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel,...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...


Unmasking the Social Engineer: The Human Element of Security

by Christopher Hadnagy & Paul Ekman

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge...


Data-Driven Security: Analysis, Visualization and Dashboards

by Jay Jacobs & Bob Rudis

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This...


Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security...


Anti-Hacker Tool Kit, Fourth Edition

by Mike Shema

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range...


Bring Your Own Device (BYOD): The mobile computing challenge

by The Chartered Institute for IT BCS

The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to...