Computers / System Administration

Best Selling / Page 5

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (312)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (401)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (401)

DRM Free (74)

DRM (327)

More options

Kali Linux Cookbook

by Pritchett Willie L. & Smet David De

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this...


Cuckoo Malware Analysis

by Oktavianto Digit & Muhardianto Iqbal

This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo...


Test-Driven Infrastructure with Chef: Bring Behavior-Driven Development to Infrastructure as Code

by Stephen Nelson-Smith

Since Test-Driven Infrastructure with Chef first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings...


Hyper-V Replica Essentials

by Krstevski Vangel

A fast-paced, step-by-step guide to configuring Hyper-V Replica in various deployment scenarios.a in various deployment scenarios.Hyper-V Replica Essentials is for Windows Server administrators who want to improve...


Take Control of 1Password

by Joe Kissell

Updated May 20, 2014

Speed through Web logins with 1Password 4!

Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe...


IBM Mainframe Security: Beyond the Basics-A Practical Guide from A Z/OS and Racf Perspective

by Dinesh D. Dattani

Rather than rehashing basic information—such as command syntax—already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance,...


SELinux System Administration

by Vermeulen Sven

A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the...


Windows Phone 8 Game Development

by Jamro Marcin

Written as a practical Packt tutorial, this essential reference will show you how to develop engaging games on the Windows Phone 8 platform.The book is dedicated to the beginners in 3D game development that...


Mobile Security: How to Secure, Privatize, and Recover Your Devices

by Speed Tim, Nykamp Darla & Heiser Mari

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information...


Take Control of Your Online Privacy

by Joe Kissell

Learn what's private online (not much)--and what to do about it!

Updated March 19, 2014

Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just...


Chef Infrastructure Automation Cookbook

by Marschall Matthias

Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server...


Puppet 3 Cookbook

by Arundel John

Puppet 3 Cookbook is written in a Cookbook style, showing you how to set up and expand your Puppet infrastructure. It not only gives you everything you need to become a Puppet expert, but includes powerful code...


Learning NServiceBus

by Boike David

This is a practical tutorial containing hands-on examples for creating a messaging and SOA based service bus.This book is for .NET developers who are looking for ways to overcome problems related to buggy third...


Android Application Security Essentials

by Rai Pragati Ogal

Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions...


How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access

by Henrik Walther

The Perfect Reference for the Multitasked System Administrators

The new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security....


Digital Archaeology: The Art and Science of Digital Forensics

by Michael W. Graves

The Definitive, Up-to-Date Guide to Digital Forensics

 

The rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital...


Cryptography InfoSec Pro Guide

by Sean-Philip Oriyano

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved...


Learning Metasploit Exploitation and Development

by Balapure Aditya

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated...


Instant Oracle GoldenGate

by Bruzzese Tony

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich...


VMware View Security Essentials

by Langenhan Daniel

A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a "how-to" for the novice, a "reference guide" for the advanced user, and a "go to"...