Computers / System Administration

Best Selling / Page 4

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (378)

Windows Administration (27)

Linux & UNIX Administration (27)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (481)

French (11)

German (31)

Spanish (5)

Italian (8)

 

Protection

All (481)

DRM Free (70)

DRM (411)

More options

Computer and Information Security Handbook

by John R. Vacca

Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Social Engineering in IT Security: Tools, Tactics, and Techniques

by Sharon Conheady

Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot Conduct ethical social engineering...


Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

by Harlan Carvey

Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the...


Building Virtual Pentesting Labs for Advanced Penetration Testing

by Cardwell Kevin

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include...


2014 Car Hacker's Manual

by Craig Smith

As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are...


Puppet Reporting and Monitoring

by Duffy Michael

An easy to follow guide with extensive examples to explain Puppet's reporting capabilities to facilitate effective implementation of Puppet in the real world as a reporting tool.If you are a Puppet developer...


System Center 2012 R2 Virtual Machine Manager Cookbook

by Cardoso Edvaldo Alessandro

This book is a step-by-step guide packed with recipes that cover architecture design and planning. The book is also full of deployment tips, techniques, and solutions. If you are a solutions architect, technical...


Security Leader Insights for Information Protection: Lessons and Strategies from Leading Security Professionals

by Bob Fahy

How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable,...


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

by Aditya Sood & Richard Enbody

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual,...


The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems

by Robert C. Seacord

“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described...


Computer Forensics and Digital Investigation with EnCase Forensic v7

by Suzanne Widup

Conduct repeatable, defensible investigations with EnCase Forensic v7 Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation...


Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex

by Bill Blunden & Violet Cheung

This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat...


OCP Upgrade to Oracle Database 12c Exam Guide (Exam 1Z0-060)

by Sam R. Alapati

A Fully Integrated Study System for OCP Exam 1Z0-060

Prepare for the Oracle Certified Professional Upgrade to Oracle Database 12c exam with this exclusive Oracle Press guide. Each chapter features step-by-step...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


AutoIt v3: Your Quick Guide

by Andy Flesner

AutoIt is becoming increasingly popularin the system administration field as atool for automating administrative tasks.Although this is one of its more popularuses, you can use AutoIt to automateanything in...


Oracle WebLogic Server 12c Administration Handbook

by Sam R. Alapati

Best Practices for Oracle WebLogic Server 12c Configuration and Administration Maintain a high-performance enterprise application framework using the detailed information in this authoritative resource. Through...


Collaboration with Cloud Computing: Security, Social Media, and Unified Communications

by Ric Messier

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes...


Word 2013 for Law Firms

by The Payne Group

Focusing only on those features of Microsoft Word 2013 that are relevant to the legal community, this updated edition of the Payne Group’s market-leading guide to Word provides industry-specific information...