Informatica / Amministrazione del sistema

I più venduti

icon Abbonati ai feed

Naviga

I più venduti

Novità

 

Categoria

Delete Amministrazione del sistema

 

Nella categoria

Sicurezza (315)

Gestione di Linux & UNIX (24)

Gestione di Windows (24)

 

Prezzo

Tutto

Gratis

Sotto i 5 $

5 $ - 10 $

10 $ - 15 $

Delete Fascia di prezzo

Da :
a :
OK

 

Lingua

Inglese (403)

Francese (11)

Tedesco (1)

Spagnolo (3)

Italiano (6)

 

Protezione

Tutto (403)

DRM Free (68)

DRM (335)

Più opzioni

CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition

di Wm. Arthur Conklin & Gregory White

Official CompTIA Content! Prepare for CompTIA Security+ Exam SY0-301 with McGraw-Hill-a Gold-Level CompTIA Authorized Partner offering Official CompTIA Approved Quality Content to give you the competitive edge...


Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

di Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


Dissecting the Hack: The F0rb1dd3n Network: The F0rb1dd3n Network

di Jayson E Street, Kent Nabors & Brian Baskin

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

di Gareth R. James

Finally, a book to guide you through the tasks of implementing XenDesktop for your company. Citrix XenDesktop Implementation is aimed to specifically address how to implement a Virtual Desktop Infrastructure...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

di Deviant Ollam

For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on...


Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

di Steven Levy

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes...


Linux Shell Scripting Cookbook, Second Edition

di Tushar Shantanu & Lakshman Sarath

This book is written in a Cookbook style and it offers learning through recipes with examples and illustrations. Each recipe contains step-by-step instructions about everything necessary to execute a particular...


Cyber Hacking

di Scientific American Editors

Cyber Hacking: Wars in Virtual Space by the editors of Scientific American

Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is...


Linux Mint System Administrator's Beginner's Guide

di Montoro Arturo Fernandez

A concise Packt Beginner's Guide to get you started with administering a Linux Mint system. This book is for those users who want to become Linux Mint system administrators and need to start learning quickly....


Guide to Windows 8 - Not 4 Geeks

di Christian Schönberger

Every new version of Windows is more complex than the older versions. Even if the newer version contains a dozen new wizards and other helps, an average user needs more and more time to learn how to use the...


Kerberos: The Definitive Guide: The Definitive Guide

di Jason Garman

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system...


Hacking Exposed 7: Network Security Secrets and Solutions

di Stuart McClure & Joel Scambray

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and...


Securing the Cloud: Cloud Computer Security Techniques and Tactics

di Vic (J.R.) Winkler

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


OpenNebula 3 Cloud Computing

di Giovanni Toraldo

This is a step-by-step practical guide to get you started easily with openNebula. It guides you to build, maintain, and configure your cloud infrastructure, providing real-world examples in a simple and coherent...


JBoss AS 7 Configuration, Deployment and Administration

di Francesco Marchioni

You will be guided through setting up a JBoss application server in a logical order, with plenty of screenshots and practical instructions to help. Java system administrators, developers, and application testers...


Seven Deadliest USB Attacks

di Brian Anderson & Barbara Anderson

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to...


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

di William L. Simon, Kevin Mitnick & Steve Wozniak

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting...


Hacking Wireless Networks for Dummies

di Peter T. Davis, Kevin Beaver & Devin K. Akin

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."

--Devin Akin - CTO, The Certified Wireless...


Social Engineering: The Art of Human Hacking

di Christopher Hadnagy & Paul Wilson

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed...


Security 2020: Reduce Security Risks This Decade

di Doug Howard & Kevin Prince

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security...