Computers / System Administration

Best Selling / Page 5

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (350)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (444)

French (10)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (444)

DRM Free (69)

DRM (375)

More options

The Essential Guide to Home Computer Security

by Robert R. Rowlingson

For the non-technical home and small-office internet user, this guide teaches "digital commonsense". The reader will learn easy-to-implement, cost-effective ways of protecting their children, finances, privacy,...


Mobile Computing: Securing Your Workforce

by BCS The Chartered Institute for IT

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly...


Hacking Exposed, Sixth Edition: Network Security Secrets& Solutions

by Stuart McClure, Joel Scambray & George Kurtz

The tenth anniversary edition of the world's bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most...


Network Security: The Complete Reference

by Roberta Bragg, Mark Rhodes-Ousley & Keith Strassberg

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel,...


Network Security Through Data Analysis: Building Situational Awareness

by Michael Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...


Unmasking the Social Engineer: The Human Element of Security

by Christopher Hadnagy & Paul Ekman

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge...


Information Warfare

by William Hutchinson & Matthew Warren

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive...


Data-Driven Security: Analysis, Visualization and Dashboards

by Jay Jacobs & Bob Rudis

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This...


Cyber Security

by John G. Voeller

Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security...


Anti-Hacker Tool Kit, Fourth Edition

by Mike Shema

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range...


Surveillance and Threat Detection: Prevention versus Mitigation

by Richard Kirchner

  • This book will be a game changer in the industry of security and protection. Federal government critical asset protection programs will take the lead. Private security will pick up and change the way they do...


Android Security Cookbook

by Makan Keith & Alexander-Bown Scott

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook"...


Bring Your Own Device (BYOD): The mobile computing challenge

by The Chartered Institute for IT BCS

The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to...


How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses and Hackers from Ruining Your Computer or Network: The Complete Guide for Your Home and Wo

by Bruce C Brown

It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research...


The Debian Administrator's Handbook

by Raphaël Hertzog & Roland Mas

Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world,...


Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

by Cameron H. Malin, Eoghan Casey & James M. Aquilina

The Syngress Digital Forensics Field Guides series is a hand-held companion for any digital and computer forensic investigator and analyst. Each book is a "tool" with checklists for specific tasks, case studies...


Hacking with Kali: Practical Penetration Testing Techniques

by James Broad & Andrew Bindner

  • Provides detailed explanations of the complete penetration testing lifecycle
  • Complete linkage of the BackTrack information, resources and distribution downloads
  • Hands-on exercises to reinforce topics


Professional Penetration Testing: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

*Find out how to turn hacking and pen testing skills into a professional career *Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers *Master...


Unified Communications Forensics: Anatomy of Common UC Attacks

by Nicholas Mr. Grant & Joseph II Shaw

  • Analysis of forensic artifacts in common Unified Communication attacks
  • In-depth look at established UC technologies and attack exploits
  • Provides readers with hands-on understanding of UC attack vectors and associated...