Please turn on your JavaScript for this page to function normally.
Q&A: E-mail spam and Software as a Service (SaaS) solutions

David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …

Q&A: SSL VPN Security

Max Huang is the founder and Executive Vice President of O2Micro and President for O2Security, a subsidiary company of O2Micro. In this interview he discusses the importance …

Q&A: Web 2.0 Security

Sam Masiello oversees the MX Logic Threat Operations Center. Masiello has more than 18 years of email systems and IT management experience, including nearly 10 years network …

Q&A: E-mail Security Threats and Countermeasures

David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …

Backup & Recovery

The undeniable importance of backup is the reason why system administrators invest time and effort into creating and maintaining a backup system fit for their infrastructure. …

Interview with Chris Sanders, Author of “Practical Packet Analysis”

Chris Sanders is a Senior Support Engineer for KeeFORCE, a technology consulting firm. Chris writes and speaks on various topics including packet analysis, network security, …

The Book of Wireless (2nd Edition)

In the last couple of years Wi-Fi has become a household name and wireless networks are now practically everywhere. Despite the proliferation of wireless Internet access, …

Mac OS X Leopard: The Missing Manual

Immediately after its release, Mac OS X Leopard became a big hit. Apple sold 2 million copies of the innovative operating system in the first weekend alone. With more than 300 …

Interview with Gregory Conti, Assistant Professor of Computer Science at the United States Military Academy

Besides his work as a professor and Director of the Information and Technology and Operations research center, Gregory Conti is also the author of the excellent book Security …

Interview with Nitesh Dhanjani and Billy Rios, Spies in the Phishing Underground

Both Nitesh and Billy are well-known security researchers that have recently managed to infiltrate the phishing underground. What started as a simple examination of phishing …

Cisco Networking Simplified (2nd Edition)

Although the vast majority of Cisco Press titles are geared towards intermediate and advanced readers that can solve complex network issues at 3 AM on a Sunday, this is one of …

The Craft of System Security

Computer security is an immense topic and there are thousands of books available that cover every possible technology and tool on the market. What makes this book different …

Don't miss

Cybersecurity news