Computers / System Administration

Best Selling / Page 4

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (312)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (401)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (401)

DRM Free (74)

DRM (327)

More options

AutoIt v3: Your Quick Guide

by Andy Flesner

AutoIt is becoming increasingly popularin the system administration field as atool for automating administrative tasks.Although this is one of its more popularuses, you can use AutoIt to automateanything in...


Oracle WebLogic Server 12c Administration Handbook

by Sam R. Alapati

Best Practices for Oracle WebLogic Server 12c Configuration and Administration

Maintain a high-performance enterprise application framework using the detailed information in this authoritative resource. Through...


Comptia Security+study Guide: Exam Sy0-201

by Emmett Dulaney

Comprehensive Coverage to Help You Prepare for the SY0-201 Exam and Beyond

This CompTIA Authorized Study Guide provides complete coverage of the objectives for CompTIA's Security+ Exam (SY0-201), with clear and...


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8

by Harlan Carvey

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free...


Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions

by Stuart McClure, Joel Scambray & George Kurtz

The tenth anniversary edition of the world's bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most...


Network Security: The Complete Reference

by Roberta Bragg, Mark Rhodes-Ousley & Keith Strassberg

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel,...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...


Unmasking the Social Engineer: The Human Element of Security

by Christopher Hadnagy & Paul Ekman

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge...


Data-Driven Security: Analysis, Visualization and Dashboards

by Jay Jacobs & Bob Rudis

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This...


Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security...


Anti-Hacker Tool Kit, Fourth Edition

by Mike Shema

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range...


The Debian Administrator's Handbook

by Raphaël Hertzog & Roland Mas

Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world,...


Carry On: Sound Advice from Schneier on Security

by Bruce Schneier

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance....


Node Security

by Barnes Dominic

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using...


Linux Utilities Cookbook

by Lewis James Kent

A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when...


Instant Windows PowerShell

by Menon Vinith

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the...


Metasploit Penetration Testing Cookbook, Second Edition

by Monika Agarwal & Abhinav Singh

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy...


Network Security Tools: Writing, Hacking, and Modifying Security Tools

by Nitesh Dhanjani & Justin Clarke

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more...


OpenStack Cloud Computing Cookbook, Second Edition

by Jackson Kevin & Bunch Cody

A Cookbook full of practical and applicable recipes that will enable you to use the full capabilities of OpenStack like never before.This book is aimed at system administrators and technical architects moving...


Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

by Thomas J. Mowbray

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats,...