Computers / System Administration

Best Selling / Page 7

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (359)

Linux & UNIX Administration (45)

Windows Administration (33)

 

Language

English (504)

French (12)

German (39)

Spanish (7)

Italian (10)

 

Protection

All (504)

DRM Free (71)

DRM (433)

More options

Learning Metasploit Exploitation and Development

by Balapure Aditya

A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated...


Instant Oracle GoldenGate

by Bruzzese Tony

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich...


VMware View Security Essentials

by Langenhan Daniel

A practical and fast-paced guide that gives you all the information you need to secure your virtual environment.This book is a "how-to" for the novice, a "reference guide" for the advanced user, and a "go to"...


Instant OSSEC Host-based Intrusion Detection

by Brad Lhotsky

Security software is often expensive, restricting, burdensome, and noisy. OSSEC-HIDS was designed to avoid getting in your way and to allow you to take control of and extract real value from industry security...


Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

by David Maynor

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion...


Applied Oracle Security: Developing Secure Database and Middleware Environments: Developing Secure Database and Middleware Environments

by David Knox, Scott Gaetjen & Hamza Jahangir

Cutting-edge techniques from leading Oracle security experts

This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments....


Instant Spring Security Starter

by Jagielski Piotr & Nabrdalik Jakub

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A concise guide written in an easy-to-follow format following...


CISA Certified Information Systems Auditor Study Guide

by David L. Cannon

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content...


Eleventh Hour Security+: Exam SY0-201 Study Guide

by Ido Dubrawsky

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam.

The book's 14 chapters provide in-depth discussions of the following topics:...


Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference

by Dustin Hannifin

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features;...


Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava & Gareth Heyes

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if...


Scene of the Cybercrime

by Debra Littlejohn Shinder & Michael Cross

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully...


Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

by Timothy "Thor" Mullen

Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains...


Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom

by Larry Daniel & Lars Daniel

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics experts,...


Google Hacking for Penetration Testers

by Johnny Long

This book helps people find sensitive information on the Web.

Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's...


Snort Intrusion Detection and Prevention Toolkit

by Brian Caswell, Jay Beale & Andrew Baker

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams, Anton Chuvakin & Tony Bradley

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development...


XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

by Steven Bolt

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the...


Instant Metasploit Starter

by Ranganath Karthik

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Instant Metasploit Starter is a fast-paced introductory...


Microsoft System Center Data Protection Manager 2012 SP1

by Buchannan Steve, Gomaa Islam & Hedblom Robert

This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network...