Computers / System Administration

Best Selling / Page 6

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (334)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (430)

French (11)

German (21)

Spanish (4)

Italian (9)

 

Protection

All (430)

DRM Free (71)

DRM (359)

More options

Information Protection Playbook

by Greg Kane & Lorna Koppel

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost....


The Basics of IT Audit: Purposes, Processes, and Practical Information

by Stephen D. Gantz

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing...


Eleventh Hour CISSP: Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for...


Network and System Security

by John R. Vacca

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored...


Managing Information Security

by John R. Vacca

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention...


The Basics of Web Hacking: Tools and Techniques to Attack the Web

by Josh Pauli

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance"...


Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

by Jason Andress & Steve Winterfeld

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all...


X-Ways Forensics Practitioner's Guide

by Brett Shavers & Eric Zimmerman

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array...


Business Continuity and Disaster Recovery Planning for IT Professionals

by Susan Snedaker

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines...


Practical Anonymity: Hiding in Plain Sight Online

by Peter Loshin

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees...


Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

by Todd G. Shipley & Art Bowker

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable...


Introduction to Cyber-Warfare: A Multidisciplinary Approach

by Paulo Shakarian, Jana Shakarian & Andrew Ruef

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book...


FISMA Compliance Handbook: Second Edition

by Laura P. Taylor

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why...


Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

by Leighton Johnson

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique...


Risk Management Framework: A Lab-Based Approach to Securing Information Systems

by James Broad

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance...


Ansible Configuration Management

by Hall Daniel

Ansible Configuration Management" is a step-by-step tutorial that teaches the use of Ansible for configuring Linux machines.This book is intended for anyone looking to understand the basics of Ansible. It is...


Carry On: Sound Advice from Schneier on Security

by Bruce Schneier

Up-to-the-minute observations from a world-famous securityexpert

Bruce Schneier is known worldwide as the foremost authority andcommentator on every security issue from cyber-terrorism to airportsurveillance....


Node Security

by Barnes Dominic

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using...


Linux Utilities Cookbook

by Lewis James Kent

A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when...


Instant Windows PowerShell

by Menon Vinith

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the...