Mirko Zorz
Q&A: Security Visualization
As chief security strategist and director of application product management, Raffael Marty is customer advocate and guardian – expert on all things security and log …
Q&A: Virtualization Security
Jim Chou is the Executive VP of Technology for Apani where he is responsible for the strategic technical development of Apani technology and product portfolio development. In …
Q&A: Views on Privacy and Identity Theft
Jonathan Moneymaker is VP of Operations at Anonymizer. He is a certified Project Management Professional and also holds a BS in Systems Engineering from the University of …
Q&A: E-mail spam and Software as a Service (SaaS) solutions
David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …
Q&A: SSL VPN Security
Max Huang is the founder and Executive Vice President of O2Micro and President for O2Security, a subsidiary company of O2Micro. In this interview he discusses the importance …
Q&A: Web 2.0 Security
Sam Masiello oversees the MX Logic Threat Operations Center. Masiello has more than 18 years of email systems and IT management experience, including nearly 10 years network …
Q&A: E-mail Security Threats and Countermeasures
David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …
Backup & Recovery
The undeniable importance of backup is the reason why system administrators invest time and effort into creating and maintaining a backup system fit for their infrastructure. …
Interview with Chris Sanders, Author of “Practical Packet Analysis”
Chris Sanders is a Senior Support Engineer for KeeFORCE, a technology consulting firm. Chris writes and speaks on various topics including packet analysis, network security, …
The Book of Wireless (2nd Edition)
In the last couple of years Wi-Fi has become a household name and wireless networks are now practically everywhere. Despite the proliferation of wireless Internet access, …
Mac OS X Leopard: The Missing Manual
Immediately after its release, Mac OS X Leopard became a big hit. Apple sold 2 million copies of the innovative operating system in the first weekend alone. With more than 300 …
Interview with Gregory Conti, Assistant Professor of Computer Science at the United States Military Academy
Besides his work as a professor and Director of the Information and Technology and Operations research center, Gregory Conti is also the author of the excellent book Security …