Please turn on your JavaScript for this page to function normally.
Google Hacks: 100 Industrial-Strength Tips & Tools

Even if you use Google all the time, this exceptional book will show you things you didn't know were possible. Since the Internet is developing and growing quite rapidly, …

Identity Theft

Identity theft has been one of the most discussed subjects in the news during the previous year. According to the cover of this book, it's the fastest growing crime in …

Edelman Cybersecurity Survey: Viruses Impact One-Third Of American Internet Users

Edelman provides comprehensive public relations and marketing services to computer security companies in the United States. They’re recent survey shows that nearly one …

Secure Shell in the Enterprise

There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …

Entrust Releases New Secure Web Portal Solution

Entrust released its latest Secure Web Portal Solution based on Entrust TruePass Version 7.0, the first Web security solution in the market today to deliver bi-directional, …

Novell eDirectory has Additional Linux Support and Enhanced Security

Novell announced Red Hat Enterprise Linux AS and SuSE Linux Enterprise Server 8 support in Novell eDirectory, the most widely deployed directory service on the market. Along …

Interview with Michael Jang, author of “Mastering Red Hat Linux 9”

Michael Jang, RHCE, Linux+, LCP, specializes in books on Linux and Linux certification. His experience with computers goes back to the days of jumbled punch cards. He’s …

Apache 1.3.28 has Been Released

The Apache Group released version 1.3.28 of the Apache HTTP Server. This version of Apache is principally a security and bug fix release. Of particular note is that 1.3.28 …

Black Hat Briefings 2003 Keynote Speakers Announced

Black Hat Inc. announced the keynote speakers for this summer’s Black Hat Briefings and Training 2003, the annual conference and workshop designed to help computer …

Interview with Rafeeq Ur Rehman, author of “Intrusion Detection with SNORT”

Who is Rafeeq Ur Rehman? Introduce yourself to our readers. I am working as Managing Consultant at Dedicated Technologies Inc. where we provide services related to enterprise …

Mastering Red Hat Linux 9

Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the …

AirDefense launches solution to secure and support wireless LANs with 24×7 monitoring for rogue detection & policy enforcement

AirDefense introduced its AirDefense Guard 1120 as an entry-level solution to provide the highest level of security and support for enterprise wireless LANs at an affordable …

Don't miss

Cybersecurity news