Computers / System Administration

Best Selling / Page 9

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Category

Delete System Administration

 

In category

Security (351)

Windows Administration (26)

Linux & UNIX Administration (25)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (445)

French (10)

German (1)

Spanish (3)

Italian (8)

 

Protection

All (445)

DRM Free (69)

DRM (376)

More options

Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava & Gareth Heyes

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if...


Scene of the Cybercrime

by Debra Littlejohn Shinder & Michael Cross

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully...


Thor's Microsoft Security Bible: A Collection of Practical Security Techniques

by Timothy "Thor" Mullen

Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains...


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm & Jason Andress

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests...


Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

by Diane Barrett & Greg Kipper

Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which...


Securing the Cloud: Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom

by Larry Daniel & Lars Daniel

Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics experts,...


Google Hacking for Penetration Testers

by Johnny Long

A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from...


Snort Intrusion Detection and Prevention Toolkit

by Brian Caswell, Jay Beale & Andrew Baker

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for...


Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

by Harlan Carvey

Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the...


PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams, Anton Chuvakin & Tony Bradley

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development...


Cyber Attacks: Protecting National Infrastructure

by Edward Amoroso

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The 10 domains are covered completely and as concisely as possible with...


Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

It's no longer just a buzz word: "Security" is an important part of your job as a Systems Administrator. Most security books are aimed at security professionals, but Security for System Administrators is written...


XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

by Steven Bolt

  • Game consoles are routinely seized and contain evidence of criminal activity

  • Author Steve Bolt wrote the first whitepaper on XBOX investigations


Instant Metasploit Starter

by Ranganath Karthik

Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Instant Metasploit Starter is a fast-paced introductory...


Microsoft System Center Data Protection Manager 2012 Sp1

by Buchannan Steve, Gomaa Islam & Hedblom Robert

This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network...


No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

by Johnny Long & Kevin D. Mitnick

I'm Going Public with the Überest of the Über!

The real ninja skillz are yours for the knowing. Want to know how to suck data off a laptop with nothing but your mind? Poke your way into a corporate e-mail server...


The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator

by Dave Kleiman

This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints...


CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

by Robert Shimonski, Naomi Alpern & Michael Cross

CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major...