Computers / System Administration

Best Selling

Language

All

English (30)

French (7)

German (0)

Spanish (2)

Italian (0)

 

Release Date

All

Last 7 days (0)

Last 30 days (0)

Current year (0)

 

Catalog Date

All

Last 7 days (0)

Last 30 days (0)

Current year (4)

 

Category

Delete System Administration

 

In category

Security (21)

Linux & UNIX Administration (2)

 

Audience

Adult (30)

 

Publisher

BCS, The Chartered Institute for IT (10)

 

Format

All

PDF (0)

EPUB (27)

AUDIOBOOK (3)

 

Total Loans

All (8)

20 - 40 (3)

40 - 100 (0)

Over 100 (5)

More options

Results : 1 - 30 of 30 Sorted by : 

Information Risk Management: A practitioner's guide

by David Sutton BCS, The Chartered Institute for IT (November 26, 2014)

Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development...


Problem Management: An implementation guide for the real world

by Michael G. Hall BCS, The Chartered Institute for IT (November 26, 2014)

Problem management is the IT service management process that tends to return more benefits more quickly than any of the others. This book offers real-world guidance on all aspects of implementing and running...


Problem Manager: Careers in IT service management

by Colin Rudd BCS, The Chartered Institute for IT (October 08, 2014)

Problem management is about finding permanent solutions to technical problems and recurring incidents in a business's IT infrastructure. This practical book describes the problem manager role in depth including...


Service Desk and Incident Manager: Careers in IT service management

by Peter Wheatcroft BCS, The Chartered Institute for IT (July 28, 2014)

The role of a service desk manager is to provide the single point of contact between an IT organisation and its users. Responsibilities include developing, implementing, monitoring and improving processes and...


Mobile Computing: Securing your workforce

by BCS The Chartered Institute for IT BCS, The Chartered Institute for IT (December 23, 2011)

According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access company resources. 65% of companies report security issues. This ebook looks at the security risks of an increasingly...


Bring Your Own Device (BYOD): The mobile computing challenge

by Bcs, The Chartered Institute for It BCS, The Chartered Institute for IT (May 01, 2013)

The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations, in particular the IT department. This ebook looks at ways to...


The Debian Administrator's Handbook

by Raphaël Hertzog & Roland Mas Freexian (December 30, 2013)

Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world,...


Vegetarian Greats: The Top 395 Best Light, Fresh and Easy Recipes - Delicious Great Food for Good Health and Smart Living

by Jo Franks Emereo Publishing (October 24, 2012)

Vegetarian Greats: The Top 395 Best Light, Fresh and Easy Recipes - Delicious Great Food for Good Health and Smart Living


Creole Greats: 99 Delicious Creole Recipes - The Top 99 Best Recipes

by Jo Franks Emereo Publishing (October 24, 2012)

Creole Greats: 99 Delicious Creole Recipes - The Top 99 Best Recipes


Cajun Greats 175 Delicious Cajun Recipes - The Top 175 Best Recipes

by Jo Franks Emereo Publishing (October 24, 2012)

Cajun Greats 175 Delicious Cajun Recipes - The Top 175 Best Recipes


Guide to Windows 8 - Not 4 Geeks

by Christian Schönberger, Sonberger Krisztian Pfa & Christian Schönberger Sonberger Krisztian Pfa (October 19, 2012)

Every new version of Windows is more complex than the older versions. Even if the newer version contains a dozen new wizards and other helps, an average user needs more and more time to learn how to use the...


The Red Web

by Andrei Soldatov & Irina Borogan PublicAffairs (September 07, 2015)

A Library Journal Best Book of 2015

A NPR Great Read of 2015

The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown. Perhaps both.

On...


Democracy Hacked

by Martin Moore Oneworld Publications (September 27, 2018)

Technology has fractured democracy, and now there’s no going back.

All around the world, the fringes have stormed the palace of the elites and unleashed data miners, dark ads and bots on an unwitting public....


The Future of Violence

by Benjamin Wittes, Gabriella Blum & Tom Weiner Blackstone Publishing (March 10, 2015)

From drone warfare in theMiddle East to digital spying by the National Security Agency, the USgovernment has harnessed the power of cutting-edge technology to awesomeeffect. But what happens when ordinary people...


Cyberdeterrence and Cyberwar

by Martin C. Libicki & Erik Sandvold Blackstone Publishing (November 09, 2010)

The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information...


CRACK99

by David Locke Hall & Mark Peckham Blackstone Publishing (October 19, 2015)

The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the US Department of Justice

A former US Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding...


The Business of Cybersecurity

by Ashwini Sathnur Business Expert Press (May 07, 2019)

Cyber security could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research....


Hands-on Incident Response and Digital Forensics

by Mike Sheward BCS, The Chartered Institute for IT (July 12, 2018)

Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what...


The Ultimate GDPR Practitioner Guide

by Stephen R Massey Fox Red Risk (December 20, 2017)

The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR. The book is crammed with advice, guidance and...


Digital Forensic Science

by Vassil Roussev, Elisa Bertino & Ravi Sandhu Morgan & Claypool Publishers (December 28, 2016)

Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical...


Privacy Risk Analysis

by Sourya Joyee De & Daniel Le Métayer Morgan & Claypool Publishers (September 06, 2016)

Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.

The deployment of new information...


Cyber Security: A practitioner's guide

by David Sutton BCS, The Chartered Institute for IT (July 10, 2017)

Cyber security is more essential today than ever, not just in the workplace but at home too. This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your...


We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

by Parmy Olson Little, Brown and Company (June 05, 2012)

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind...


The Red Web

by Andrei Soldatov & Irina Borogan PublicAffairs (September 08, 2015)

A Library Journal Best Book of 2015

A NPR Great Read of 2015

The Internet in Russia is either the most efficient totalitarian tool or the device by which totalitarianism will be overthrown. Perhaps both.

On the...


Computer Security (Speedy Study Guides)

by Speedy Publishing Dot EDU (April 28, 2015)

Computer thieves are everywhere and most of them are untraceable for weeks - months maybe. Learning to add computer security will ensure that all sensitive information stored online are kept safe. This quick...


IT Service Management: Support for your ITSM Foundation exam

by John Sansbury, Ernest Brewster, Aidan Lawes & Richard Griffiths BCS, The Chartered Institute for IT (April 08, 2016)

Covering the latest thinking in IT service management, this new edition provides a comprehensive introduction for those preparing for their ITSM foundation exam.


Information Security Auditor: Careers in information security

by Wendy Goucher BCS, The Chartered Institute for IT (March 10, 2016)

The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering...


We Are Anonymous

by Parmy Olson Little, Brown and Company (June 04, 2012)

A thrilling, exclusive exposè of the hacker collectives Anonymous and LulzSec.

We Are Anonymous is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind...


The Debian Administrator's Handbook

by Raphaël Hertzog & Roland Mas Freexian (October 21, 2015)

Debian GNU/Linux, a very popular non-commercial Linux distribution, is known for its reliability and richness. Built and maintained by an impressive network of thousands of developers throughout the world,...


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

by William L. Simon, Kevin Mitnick & Steve Wozniak Little, Brown and Company (August 15, 2011)

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting...