Please turn on your JavaScript for this page to function normally.
Interview with Nicholas Raba, co-author of “Maximum Security 4/e”

Who is Nicholas Raba? Introduce yourself to our readers. Call me Nick. I’m the author of SecureMac.com, a site devoted to Macintosh security. This site has allowed me a …

The Art of Deception: Controlling the Human Element of Security

Kevin Mitnick is one of the best-known figures in the world of computer security. There's a lot of controversy surrounding Mitnick - some regard him as a hacker, others as a …

Interview with Greg Vaughn, co-author of “Maximum Security 4/e”

Who is Greg Vaughn? Introduce yourself to our readers. I’m primarily an enterprise application programmer. I’d been a consultant for a number of years before …

The Hack-Counter Hack Training Course: A Network Security Seminar from Ed Skoudis

Some people prefer books that deliver a wealth of theoretical knowledge they can build on, while other always go for the hands-on experience. This course is all hands-on …

Interview with Billy Barron, co-author of “Maximum Security 4/e”

Who is Billy Barron? Introduce yourself to our readers. I am a 15 year veteran of the computer industry. What’s unique about my background is that I’ve spent about …

Trusted Debian v1.0 officially released

The Trusted Debian project aims to create a highly secure but usable Linux platform. To accomplish this, the project will use currently available security solutions for Linux …

NetBSD 1.6.1 has been released

The NetBSD operating system is a full-featured, open source, UNIX-like operating system descended from the Berkeley Networking Release 2 (Net/2), 4.4BSD-Lite, and …

Interview with Andrew G. Mason, author of “Cisco Secure Virtual Private Networks”

Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, CCStudy.com (resource site for Cisco Certification), and Boxing Orange. …

Security in Computing 3/e

This senior/graduate level textbook will give you a good foundation in computer security. The targeted audiences of this book are computer scientists, college students, …

Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”

Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …

PTG Interactive’s Training Course for Red Hat Linux: A Digital Seminar on CD-ROM 2/e

This interactive course will certainly introduce Red Hat Linux to a broader audience because it's definitely fun to learn this way. What's very handy is that the end of each …

Interview with Scott Barman, author of “Writing Information Security Policies”

Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …

Don't miss

Cybersecurity news