Computers / System Administration

Best Selling / Page 7

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (320)

Windows Administration (25)

Linux & UNIX Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (411)

French (12)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (411)

DRM Free (68)

DRM (343)

More options

Instant Spring Security Starter

by Jagielski Piotr & Nabrdalik Jakub

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to-follow format following...


Cisa Certified Information Systems Auditor Study Guide

by David L. Cannon

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content...


Eleventh Hour Security+: Exam SY0-201 Study Guide

by Ido Dubrawsky

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam.

The book's 14 chapters provide in-depth discussions of the following topics:...


Dissecting the Hack: The F0rb1dd3n Network, Revised Edition: The F0rb1dd3n Network

by Jayson E Street, Kent Nabors & Brian Baskin

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network,” tells the fictional story of...


Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Un

by Cory Altheide & Harlan Carvey

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use...


Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

by Dustin Hannifin

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features;...


Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava & Gareth Heyes

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if...


Scene of the Cybercrime

by Debra Littlejohn Shinder & Michael Cross

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully...


Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

by Timothy "Thor" Mullen

Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains...


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm & Jason Andress

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical...


Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

by Diane Barrett & Greg Kipper

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments provides an introduction to virtualized environments and their implications on forensic investigations. It emphasizes...


Securing the Cloud: Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom

by Larry Daniel & Lars Daniel

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics experts,...


Google Hacking for Penetration Testers

by Johnny Long

This book helps people find sensitive information on the Web.

Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's...


Snort Intrusion Detection and Prevention Toolkit

by Brian Caswell, Jay Beale & Andrew Baker

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for...


Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

by Harlan Carvey

Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams, Anton Chuvakin & Tony Bradley

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development...


Cyber Attacks: Protecting National Infrastructure

by Edward Amoroso

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtain CISSP certification. The exam is designed to ensure that someone...


Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection...