Mirko Zorz
HNS Coverage from the RSA Conference 2004 USA
The entrance at the conference The 13th annual RSA Conference brings together IT professionals, developers, policy makers, industry leaders and academics to share information …
Beginning Red Hat Linux 9
The many authors managed to squeeze into this title the most important facts for a novice user and point him into the right direction. Clearly written and amply …
FreeBSD 5.2 is here
Building upon the success of FreeBSD 5.1, this release includes: Full Tier-1 support for single and multiprocessor AMD Athlon64 and Opteron systems. Dynamically linked root …
The Effective Incident Response Team
With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …
Essential System Administration Pocket Reference
The title does the book justice as with its miniature size this is the most portable reference guide I've come across. If you need information while on the road or just …
Reflecting On Linux Security In 2003
This has been indeed an interesting year for Linux security. The point of this article is to offer a view on what I believe to be some of the most interesting happenings in …
An In-Depth Look Into Windows Security in 2003
When it comes to security predictions for next year, basically everyone says it’s going to be worst than this year despite the increased spending on security and some …
Interview with Jon Edney, author of “Real 802.11 Security”
Jon Edney specializes in wireless networking and is a key contributor to the development of IEEE 802.11 systems. As a member of the technology consultancy Symbionics Networks, …
Open Source Network Administration
You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …
Interview with Michael J. Weber, author of “Invasion of Privacy”
Michael J. Weber’s career began on Madison Avenue where he produced hundreds of TV commercials, including several award winners, for top sponsors and ad agencies. He …
Secrets of Computer Espionage: Tactics and Countermeasures
Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …
Windows XP Hacks
This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility