Computers / System Administration

Best Selling / Page 10

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (313)

Linux & UNIX Administration (25)

Windows Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (401)

French (11)

German (1)

Spanish (3)

Italian (6)

 

Protection

All (401)

DRM Free (73)

DRM (328)

More options

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

by Dafydd Stuttard & Marcus Pinto

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts....


The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

by Kevin D. Mitnick

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception

Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments...


Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

by Eric D. Knapp & Raj Samani

Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies...


Schneier on Security

by Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses...


Instant Munin Plugin Starter

by Brinke Bart ten

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.This hands-on Starter guide will get you up and running with...


Instant VMware vCloud Starter

by Langenhan Daniel

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. This book is written in an easytoread style, with a strong...


Enterprise Security: A Data-Centric Approach to Securing the Enterprise

by Woody Aaron

It's a reference guide to enterprise security programs. This book is intended for the IT security staff beginner to expert but would also be a valuable resource for other IT functions such as IT compliance,...


Instant Citrix Security How-to

by Jacob Carmel

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich...


Instant Chef Starter

by Ewart John

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.This is a practical Starter guide which helps you gain the...


Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

by Brett Shavers

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book...


Linux Security Cookbook

by Daniel J. Barrett, Richard E. Silverman & Robert G. Byrnes

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing...


Botnets: The Killer Web Applications

by Craig Schiller & James R. Binkley

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how...


Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems

by Shuangbao Paul Wang & Robert S. Ledley

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a...


Using Social Media for Global Security

by Ravi Gupta & Hugh Brooks

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social...


Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to

by Sivarajan Santhosh

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. Presented in a hands-on reference manual style, with real-world...


Hacking For Dummies

by Kevin Beaver

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own...


Public Key Cryptography: Applications and Attacks

by Lynn Margaret Batten

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces...


SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices

by Joey Hirao

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail,...


Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

by Jesse Varsalone

This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of...


UNIX and Linux Forensic Analysis DVD Toolkit

by Chris Pogue, Cory Altheide & Todd Haverkos

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report,...