Mirko Zorz
Interview with Greg Vaughn, co-author of “Maximum Security 4/e”
Who is Greg Vaughn? Introduce yourself to our readers. I’m primarily an enterprise application programmer. I’d been a consultant for a number of years before …
The Hack-Counter Hack Training Course: A Network Security Seminar from Ed Skoudis
Some people prefer books that deliver a wealth of theoretical knowledge they can build on, while other always go for the hands-on experience. This course is all hands-on …
Interview with Billy Barron, co-author of “Maximum Security 4/e”
Who is Billy Barron? Introduce yourself to our readers. I am a 15 year veteran of the computer industry. What’s unique about my background is that I’ve spent about …
Trusted Debian v1.0 officially released
The Trusted Debian project aims to create a highly secure but usable Linux platform. To accomplish this, the project will use currently available security solutions for Linux …
NetBSD 1.6.1 has been released
The NetBSD operating system is a full-featured, open source, UNIX-like operating system descended from the Berkeley Networking Release 2 (Net/2), 4.4BSD-Lite, and …
Interview with Andrew G. Mason, author of “Cisco Secure Virtual Private Networks”
Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, CCStudy.com (resource site for Cisco Certification), and Boxing Orange. …
Security in Computing 3/e
This senior/graduate level textbook will give you a good foundation in computer security. The targeted audiences of this book are computer scientists, college students, …
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”
Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …
PTG Interactive’s Training Course for Red Hat Linux: A Digital Seminar on CD-ROM 2/e
This interactive course will certainly introduce Red Hat Linux to a broader audience because it's definitely fun to learn this way. What's very handy is that the end of each …
Interview with Scott Barman, author of “Writing Information Security Policies”
Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …
Catapult Communications supports network security tests
Catapult Communications Corporation announced support for a SIP (Session Initiation Protocol) test suite that has been sanctioned by CERT. The Catapult DCT2000 and LANCE test …
IT Security: Risking the Corporation
Throughout the book the author underlines the importance of security auditing and keeping up with patches. What you get here is excellent advice packed into a book that's easy …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd