Computers / System Administration

Best Selling / Page 7

icon Subscribe to feed


Best Selling

New Releases



Delete System Administration


In category

Security (385)

Linux & UNIX Administration (31)

Windows Administration (28)





Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :



English (497)

French (11)

German (31)

Spanish (4)

Italian (9)



All (497)

DRM Free (71)

DRM (426)

More options

FISMA Compliance Handbook: Second Edition

by Laura P. Taylor

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why...

Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response

by Leighton Johnson

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique...

Risk Management Framework: A Lab-Based Approach to Securing Information Systems

by James Broad

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance...

Ansible Configuration Management

by Hall Daniel

Ansible Configuration Management" is a step-by-step tutorial that teaches the use of Ansible for configuring Linux machines.This book is intended for anyone looking to understand the basics of Ansible. It is...

Carry On: Sound Advice from Schneier on Security

by Bruce Schneier

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance....

Node Security

by Barnes Dominic

A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using...

Linux Utilities Cookbook

by Lewis James Kent

A Cookbook-style guide packed with examples and illustrations, it offers organized learning through recipes and step-by-step instructions. The book is designed so that you can pick exactly what you need, when...

Instant Windows PowerShell

by Menon Vinith

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the...

Metasploit Penetration Testing Cookbook, Second Edition

by Monika Agarwal & Abhinav Singh

This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy...

Network Security Tools: Writing, Hacking, and Modifying Security Tools

by Nitesh Dhanjani & Justin Clarke

If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more...

OpenStack Cloud Computing Cookbook, Second Edition

by Jackson Kevin & Bunch Cody

A Cookbook full of practical and applicable recipes that will enable you to use the full capabilities of OpenStack like never before.This book is aimed at system administrators and technical architects moving...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

by Thomas J. Mowbray

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats,...

Kali Linux Cookbook

by Pritchett Willie L. & Smet David De

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this...

Cuckoo Malware Analysis

by Oktavianto Digit & Muhardianto Iqbal

This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo...

Test-Driven Infrastructure with Chef: Bring Behavior-Driven Development to Infrastructure as Code

by Stephen Nelson-Smith

Since Test-Driven Infrastructure with Chef first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings...

Hyper-V Replica Essentials

by Krstevski Vangel

A fast-paced, step-by-step guide to configuring Hyper-V Replica in various deployment scenarios.a in various deployment scenarios.Hyper-V Replica Essentials is for Windows Server administrators who want to improve...

Take Control of 1Password

by Joe Kissell

Updated May 20, 2014

Speed through Web logins with 1Password 4!

Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe...

IBM Mainframe Security: Beyond the Basics-A Practical Guide from A Z/OS and Racf Perspective

by Dinesh D. Dattani

Rather than rehashing basic information—such as command syntax—already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance,...

SELinux System Administration

by Vermeulen Sven

A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the...

Windows Phone 8 Game Development

by Jamro Marcin

Written as a practical Packt tutorial, this essential reference will show you how to develop engaging games on the Windows Phone 8 platform.The book is dedicated to the beginners in 3D game development that...