Please turn on your JavaScript for this page to function normally.
Interview with Christopher Negus, author of “Red Hat Linux 8 Bible”

Christopher Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more than two decades. During that time, Chris worked at AT&T …

Three-Day Virtual Conference on Remote Access, VPN and Web Application Security

Rainbow Technologies announced that a trio of security experts will participate in multiple panel discussions ranging from remote access deployments to virtual private network …

Red Hat Linux 8 Bible

As Linux gains more and more popularity we have books on the subject being published frequently. This is one of the latest books on Red Hat Linux 8 that, as all books do, …

Maximum Security 4/e

When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …

Interview with Steve Kalman, Managing Director for Esquire Micro Consultants

Who is Steve Kalman? I’ve been in MIS since 1968, when I learned to program in Fortran at Ohio State University. Over the years I’ve been a programmer, systems …

Interview with Richard Boyer, Vice President of Program Management of NetFrameworks

Richard Boyer is Vice President of Program Management of NetFrameworks. Rich heads the security training, security planning tools, and secure content management business …

Personal Firewalls for Administrators and Remote Users

Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …

Interview with Christopher Alberts, a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute

Christopher Alberts is a senior member of the technical staff in the Networked Systems Survivability Program at the Software Engineering Institute (SEI). Before joining the …

A Practical Guide to Red Hat Linux 8

What you get with this massive book is a compendious guide to Red Hat Linux 8 that covers basically everything a Red Hat user might need. I can highly recommend it to both the …

IBM has released 6 new prep tutorials for DB2 Certification

The new tutorials will teach you the basics of the DB2 products and tools, DB2 security, and much more. You need to make a FREE registration to view the tutorials. Here they …

Interview with Carlisle Adams, Senior Cryptographer and Principal of Security at Entrust, Inc.

Carlisle Adams is recognized internationally for his many contributions to the design, specification, and standardization of public-key infrastructures. He is senior …

Managing Cisco Network Security

This book presents all the topics covered in the instructor-led certification preparation course with the same name - Managing Cisco Network Security (MCNS). The goal of this …

Don't miss

Cybersecurity news