Computers / System Administration

Best Selling / Page 6

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (332)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (426)

French (10)

German (1)

Spanish (4)

Italian (7)

 

Protection

All (426)

DRM Free (69)

DRM (357)

More options

Eleventh Hour CISSP: Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for...


Network and System Security

by John R. Vacca

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored...


Managing Information Security

by John R. Vacca

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention...


The Basics of Web Hacking: Tools and Techniques to Attack the Web

by Josh Pauli

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance"...


Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

by Jason Andress & Steve Winterfeld

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all...


X-Ways Forensics Practitioner's Guide

by Brett Shavers & Eric Zimmerman

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array...


Business Continuity and Disaster Recovery Planning for IT Professionals

by Susan Snedaker

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines...


Practical Anonymity: Hiding in Plain Sight Online

by Peter Loshin

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees...


Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

by Todd G. Shipley & Art Bowker

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable...


Introduction to Cyber-Warfare: A Multidisciplinary Approach

by Paulo Shakarian, Jana Shakarian & Andrew Ruef

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book...


FISMA Compliance Handbook: Second Edition

by Laura P. Taylor

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why...


Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

by Leighton Johnson

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique...


Risk Management Framework: A Lab-Based Approach to Securing Information Systems

by James Broad

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance...


Ansible Configuration Management

by Hall Daniel

Ansible Configuration Management" is a step-by-step tutorial that teaches the use of Ansible for configuring Linux machines.This book is intended for anyone looking to understand the basics of Ansible. It is...


Carry On: Sound Advice from Schneier on Security

by Bruce Schneier

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance....


Node Security

by Barnes Dominic

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using...


Linux Utilities Cookbook

by Lewis James Kent

A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when...


Instant Windows PowerShell

by Menon Vinith

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the...


Metasploit Penetration Testing Cookbook, Second Edition

by Monika Agarwal & Abhinav Singh

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy...


Network Security Tools: Writing, Hacking, and Modifying Security Tools

by Nitesh Dhanjani & Justin Clarke

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more...