Mirko Zorz
Google Hacks: 100 Industrial-Strength Tips & Tools
Even if you use Google all the time, this exceptional book will show you things you didn't know were possible. Since the Internet is developing and growing quite rapidly, …
Identity Theft
Identity theft has been one of the most discussed subjects in the news during the previous year. According to the cover of this book, it's the fastest growing crime in …
Edelman Cybersecurity Survey: Viruses Impact One-Third Of American Internet Users
Edelman provides comprehensive public relations and marketing services to computer security companies in the United States. They’re recent survey shows that nearly one …
Secure Shell in the Enterprise
There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …
Entrust Releases New Secure Web Portal Solution
Entrust released its latest Secure Web Portal Solution based on Entrust TruePass Version 7.0, the first Web security solution in the market today to deliver bi-directional, …
Novell eDirectory has Additional Linux Support and Enhanced Security
Novell announced Red Hat Enterprise Linux AS and SuSE Linux Enterprise Server 8 support in Novell eDirectory, the most widely deployed directory service on the market. Along …
Interview with Michael Jang, author of “Mastering Red Hat Linux 9”
Michael Jang, RHCE, Linux+, LCP, specializes in books on Linux and Linux certification. His experience with computers goes back to the days of jumbled punch cards. He’s …
Apache 1.3.28 has Been Released
The Apache Group released version 1.3.28 of the Apache HTTP Server. This version of Apache is principally a security and bug fix release. Of particular note is that 1.3.28 …
Black Hat Briefings 2003 Keynote Speakers Announced
Black Hat Inc. announced the keynote speakers for this summer’s Black Hat Briefings and Training 2003, the annual conference and workshop designed to help computer …
Interview with Rafeeq Ur Rehman, author of “Intrusion Detection with SNORT”
Who is Rafeeq Ur Rehman? Introduce yourself to our readers. I am working as Managing Consultant at Dedicated Technologies Inc. where we provide services related to enterprise …
Mastering Red Hat Linux 9
Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the …
AirDefense launches solution to secure and support wireless LANs with 24×7 monitoring for rogue detection & policy enforcement
AirDefense introduced its AirDefense Guard 1120 as an entry-level solution to provide the highest level of security and support for enterprise wireless LANs at an affordable …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility