Please turn on your JavaScript for this page to function normally.
Interview with Nitesh Dhanjani and Billy Rios, Spies in the Phishing Underground

Both Nitesh and Billy are well-known security researchers that have recently managed to infiltrate the phishing underground. What started as a simple examination of phishing …

Cisco Networking Simplified (2nd Edition)

Although the vast majority of Cisco Press titles are geared towards intermediate and advanced readers that can solve complex network issues at 3 AM on a Sunday, this is one of …

The Craft of System Security

Computer security is an immense topic and there are thousands of books available that cover every possible technology and tool on the market. What makes this book different …

Interview with Michael Rash, Security Architect and Author of “Linux Firewalls”

Michael Rash is a security architect with Enterasys Networks, where he develops the Dragon intrusion and prevention system. He is a frequent contributor to open source …

Security Data Visualization

The visualization of security data is useful to the modern security analyst, and it will certainly become essential in certain environments very soon. Never has there been …

Interview with Janne Uusilehto, Head of Nokia Product Security

Janne is Head of Nokia Product Security, responsible for product security development at the world’s number 1 mobile device manufacturer. He is a member of several Nokia …

Ubuntu Linux for Non-Geeks (2nd Edition)

Many still believe that using Linux requires some advanced knowledge and that it's far for being user friendly. With time, user friendliness has become an important part of …

Wi-Fi Hotspots: Setting Up Public Wireless Internet Access

These days, if you find yourself at the airport, in a hotel or coffee shop, you're bound to see someone using a notebook, smartphone or PDA connected to the Internet. This is …

Linux Firewalls: Attack Detection and Response with iptables, psad and fwsnort

I think there's no need to emphasize the significance of a firewall in the overall security architecture. Countless security professionals turn to Linux when it comes to …

Virtual Honeypots: From Botnet Tracking to Intrusion Detection

In order to stay one step ahead the attackers you have to learn what they know. Honeypots enable security professionals to identify potential risks and improve their defensive …

Ubuntu Unleashed (2nd Edition)

According to the 2007 Desktop Linux Survey, 30 percent of the respondents are using Ubuntu, and this makes it the most popular desktop Linux distribution. With such a large …

Security Metrics: Replacing Fear, Uncertainty, and Doubt

In the modern enterprise environment, investing in security and implementing is properly is a complex process that has to be based on certain metrics. Furthermore, how can one …

Don't miss

Cybersecurity news