Computers / System Administration

Best Selling / Page 10

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (320)

Windows Administration (25)

Linux & UNIX Administration (24)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (411)

French (12)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (411)

DRM Free (68)

DRM (343)

More options

Instant PostgreSQL Backup and Restore How-To

by Thomas Shaun M.

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This hands-on guide provides a quick and easy way to back up and restore your database using PostgreSQL.Written...


Instant Apple Configurator How-to

by Edge Charles & Houston TJ

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich...


Instant Windows Powershell 3.0 Windows Management Instrumentation Starter

by Blawat Brenton J.W.

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. If you're a keen administrator who wishes to learn more...


Windows Server 2012 Automation with Powershell Cookbook

by Goad Ed

Cookbook with recipes based on real life examples.This book is written to assist the daily tasks for systems administrators, engineers, and architects working with Windows Server 2012.


Getting Started with Oracle Event Processing 11g

by Alves Alexandre, Smith Robin J. & Williams Lloyd

This getting started book will use practical chapters which follow logical and progressively more complex tasks and examples, which will impart the skills of how to use Oracle Complex Event Processing to the...


Salesforce Crm Admin Cookbook

by Goodey Paul

This book is written in a Cookbook-style format and provides you with immediately useable recipes that extend the functionality of Salesforce CRM and solves real-world problems encountered within the Salesforce...


Snort Intrusion Detection 2.0

by Syngress

The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments.

Snort 2.0 Intrusion Detection is the first...


Hack Proofing Your Network 2E

by Syngress

A new edition the most popular Hack Proofing book around!

IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best...


E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

by Syngress

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later...


Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

by Eric Cole, Michael Nordfelt & Sandra Ring

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...


Host Integrity Monitoring Using Osiris and Samhain

by Brian Wotring

This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance,...


Hacking the Code: Auditor's Guide to Writing Secure Code for the Web

by Mark Burnett

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture...


Ethereal Packet Sniffing

by Syngress

This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal,...


BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic: Implementing Cryptographic Multiple Precision Arithmetic

by Tom St Denis

Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision....


Reliability and Availability of Cloud Computing

by Eric Bauer & Randee Adams

A holistic approach to service reliability and availability of cloud computing

Reliability and Availability of Cloud Computing provides IS/IT system and solution architects, developers, and engineers with the...


The Art of Deception: Controlling the Human Element of Security

by William L. Simon, Kevin D. Mitnick & Steve Wozniak

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security

Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts...


The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

by Dafydd Stuttard & Marcus Pinto

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts....


The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

by Kevin D. Mitnick

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception

Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments...


Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

by Eric D. Knapp & Raj Samani

Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies...


Schneier on Security

by Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses...