Mirko Zorz
Q&A: Views on Privacy and Identity Theft
Jonathan Moneymaker is VP of Operations at Anonymizer. He is a certified Project Management Professional and also holds a BS in Systems Engineering from the University of …
Q&A: E-mail spam and Software as a Service (SaaS) solutions
David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …
Q&A: SSL VPN Security
Max Huang is the founder and Executive Vice President of O2Micro and President for O2Security, a subsidiary company of O2Micro. In this interview he discusses the importance …
Q&A: Web 2.0 Security
Sam Masiello oversees the MX Logic Threat Operations Center. Masiello has more than 18 years of email systems and IT management experience, including nearly 10 years network …
Q&A: E-mail Security Threats and Countermeasures
David Vella is the Director of Product Management at GFI with experience in quality assurance, network administration and software development. In this Q&A he provides …
Backup & Recovery
The undeniable importance of backup is the reason why system administrators invest time and effort into creating and maintaining a backup system fit for their infrastructure. …
Interview with Chris Sanders, Author of “Practical Packet Analysis”
Chris Sanders is a Senior Support Engineer for KeeFORCE, a technology consulting firm. Chris writes and speaks on various topics including packet analysis, network security, …
The Book of Wireless (2nd Edition)
In the last couple of years Wi-Fi has become a household name and wireless networks are now practically everywhere. Despite the proliferation of wireless Internet access, …
Mac OS X Leopard: The Missing Manual
Immediately after its release, Mac OS X Leopard became a big hit. Apple sold 2 million copies of the innovative operating system in the first weekend alone. With more than 300 …
Interview with Gregory Conti, Assistant Professor of Computer Science at the United States Military Academy
Besides his work as a professor and Director of the Information and Technology and Operations research center, Gregory Conti is also the author of the excellent book Security …
Interview with Nitesh Dhanjani and Billy Rios, Spies in the Phishing Underground
Both Nitesh and Billy are well-known security researchers that have recently managed to infiltrate the phishing underground. What started as a simple examination of phishing …
Cisco Networking Simplified (2nd Edition)
Although the vast majority of Cisco Press titles are geared towards intermediate and advanced readers that can solve complex network issues at 3 AM on a Sunday, this is one of …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users