Computers / System Administration

Best Selling / Page 2

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (359)

Linux & UNIX Administration (45)

Windows Administration (33)

 

Language

English (504)

French (12)

German (39)

Spanish (7)

Italian (10)

 

Protection

All (504)

DRM Free (71)

DRM (433)

More options

Learning Chef: A Guide to Configuration Management and Automation

by Mischa Taylor & Seth Vargo

Get a hands-on introduction to the Chef, the configuration management tool for solving operations issues in enterprises large and small. Ideal for developers and sysadmins new to configuration management, this...


Security 2020: Reduce Security Risks This Decade

by Doug Howard & Kevin Prince

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security...


Microsoft System Center 2012 R2 Compliance Management Cookbook

by Baumgarten Andreas & Isherwood Ronnie

Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements,...


CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

by Tom Canavan

Learn to secure Web sites built on open source CMSs

Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you're responsible for one of them, this comprehensive security...


CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002

by Michael Gregg

CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam

CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition...


Problem Manager: Careers in IT service management

by Colin Rudd

Problem management is about finding permanent solutions to technical problems and recurring incidents in a business's IT infrastructure. This practical book describes the problem manager role in depth including...


A Practical Guide to Trusted Computing

by David Challener, Kent Yoder & Ryan Catherman

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed...


Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection

by Christian Collberg & Jasvir Nagra

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”...


Secure Programming with Static Analysis

by Brian Chess & Jacob West

The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite...


Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities

by Vittorio Bertocci, Garrett Serack & Caleb Baker

WiUnderstanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management: A Governance, Risk and Compliance Framework by Peter Trim and Yang-Im Lee has been written for a wide audience. Derived from research, it places security management in a holistic context...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Learning Cocos2d-x Game Development

by Shekar Siddharth

If you are a hobbyist, novice game developer, or programmer who wants to learn about developing games/apps using Cocos2d-x, this book is ideal for you.


Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Digital Short Cut)

by Rand Morimoto

This is the eBook version of the printed book.

With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption...


Customizing Chef

by Jon Cowie

Take advantage of Chef’s highly customizable design to tackle specific automation issues that you can’t solve by simply using Chef’s tools, resources, and services out of the box. With this practical guide,...


Learning McOllective: Parallel Server Management in Puppet and Chef

by Jo Rhett

Orchestrate change across server clusters in near realtime with MCollective, the framework that works in concert with Puppet, Chef, and other configuration management tools. Ideal for system administrators and...


Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training,...


CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...


Geekonomics: The Real Cost of Insecure Software

by David Rice

The Real Cost of Insecure Software

 

•   In 1996, software defects in a Boeing 757 caused a crash that killed 70 people…

•   In 2003, a software vulnerability helped cause the largest U.S. power outage...


Service Desk and Incident Manager: Careers in IT service management

by Peter Wheatcroft

The role of a service desk manager is to provide the single point of contact between an IT organisation and its users. Responsibilities include developing, implementing, monitoring and improving processes and...