Computers / System Administration

Best Selling / Page 2

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (351)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (445)

French (10)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (445)

DRM Free (69)

DRM (376)

More options

Problem Management: An implementation guide for the real world

by Michael G. Hall

Problem management is the IT service management process that tends to return more benefits more quickly than any of the others. This book offers real-world guidance on all aspects of implementing and running...


Burp Suite Essentials

by Mahajan Akash

If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic...


Oracle Database 12c Security

by Scott Gaetjen, David Knox & William Maroulis

Best Practices for Comprehensive Oracle Database Security

Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing,...


Social Engineering: The Art of Human Hacking

by Christopher Hadnagy & Paul Wilson

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed...


Security 2020: Reduce Security Risks This Decade

by Doug Howard & Kevin Prince

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security...


Network Security Bible

by Eric Cole

The comprehensive A-to-Z guide on network security, fully revised and updated

Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments....


Microsoft System Center 2012 R2 Compliance Management Cookbook

by Baumgarten Andreas & Isherwood Ronnie

Whether you are an IT manager, an administrator, or security professional who wants to learn how Microsoft Security Compliance Manager and Microsoft System Center can help fulfil compliance and security requirements,...


Security Engineering: A Guide to Building Dependable Distributed Systems

by Ross J. Anderson

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online...


Cryptography Engineering: Design Principles and Practical Applications

by Niels Ferguson, Bruce Schneier & Tadayoshi Kohno

The ultimate guide to cryptography, updated from an author teamof the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an erawhen the formula to do so becomes more and...


IP Address Management Principles and Practice

by Timothy Rooney

This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services,...


CMS Security Handbook: The Comprehensive Guide for Wordpress, Joomla, Drupal, and Plone

by Tom Canavan

Learn to secure Web sites built on open source CMSs

Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you’re responsible for one of them, this comprehensive security...


Secrets and Lies: Digital Security in a Networked World

by Bruce Schneier

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network

Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to...


The Shellcoder's Handbook: Discovering and Exploiting Security Holes

by Chris Anley, John Heasman & Felix Lindner

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material...


CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002

by Michael Gregg

CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam

CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition...


Problem Manager: Careers in IT service management

by Colin Rudd

Problem management is about finding permanent solutions to technical problems and recurring incidents in a business's IT infrastructure. This practical book describes the problem manager role in depth including...


A Practical Guide to Trusted Computing

by David Challener, Kent Yoder & Ryan Catherman

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed...


Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection

by Christian Collberg & Jasvir Nagra

“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”...


Secure Programming with Static Analysis

by Brian Chess & Jacob West

The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite...


Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities, Adobe Reader

by Vittorio Bertocci, Garrett Serack & Caleb Baker

WiUnderstanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled...


Cyber Security Management: A Governance, Risk and Compliance Framework

by Peter Trim & Yang-Im Lee

Cyber Security Management places security management in a holistic context and outlines how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. The book is unique...