Computers / System Administration

Best Selling / Page 8

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (320)

Windows Administration (25)

Linux & UNIX Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (411)

French (12)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (411)

DRM Free (68)

DRM (343)

More options

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

by Steven Bolt

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the...


Instant Metasploit Starter

by Ranganath Karthik

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Instant Metasploit Starter is a fast-paced introductory...


Microsoft System Center Data Protection Manager 2012 Sp1

by Buchannan Steve, Gomaa Islam & Hedblom Robert

This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network...


No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

by Johnny Long & Kevin D. Mitnick

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.

As the cliché goes, information is power. In this age of technology, an increasing majority...


The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator

by Dave Kleiman

This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints...


CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

by Robert Shimonski, Naomi Alpern & Michael Cross

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

Practical Lock Picking: A Physical Penetration Tester's Training Guide provides an introduction to the basic principles of lock picking. It combines both easy-to-follow, step-by-step lessons, and tutorials that...


A Guide to Kernel Exploitation: Attacking the Core

by Enrico Perla & Massimiliano Oldani

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

by Gareth R. James

Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation...


Managed Code Rootkits: Hooking into Runtime Environments

by Erez Metula

Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The...


Metrics and Methods for Security Risk Management

by Carl Young

Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information...


Oracle WebLogic Server 12c Advanced Administration Cookbook

by Iwazaki Dalton

Using real life problems and simple solutions this book will make any issue seem small. WebLogic Server books can be a bit dry but Dalton keeps the tone light and ensures no matter how complex the problem you...


Instant CloudFlare Starter

by Dickey Jeff

Written as a practical guide, CloudFlare Starter will show you all you need to know in order to effectively improve your online presence in a multitude of different ways."CloudFlare Starter" is a practical yet...


Vagrant: Up and Running

by Mitchell Hashimoto

Discover why Vagrant is a must-have tool for thousands of developers and ops engineers. This hands-on guide shows you how to use this open source software to build a virtual machine for any purpose—including...


Active Directory Cookbook

by Brian Svidergol & Robbie Allen

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common...


Instant Nagios Starter

by Guthrie Michael

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.A concise guide, written in an easy-to-follow format.Instant...


Implementing Vmware Horizon View 5.2

by Ventresco Jason

A step-by-step tutorial covering all components of the View Horizon suite in detail, to ensure that you can utilize all features of the platform, and discover all of the possible ways that it can be used within...


How to Cheat at Windows System Administration Using Command Line Scripts

by Pawan K Bhardwaj

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command...


The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

by Robert Shimonski

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost...


Cryptography for Developers

by Tom St Denis

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second...