Please turn on your JavaScript for this page to function normally.
Interview with Greg Vaughn, co-author of “Maximum Security 4/e”

Who is Greg Vaughn? Introduce yourself to our readers. I’m primarily an enterprise application programmer. I’d been a consultant for a number of years before …

The Hack-Counter Hack Training Course: A Network Security Seminar from Ed Skoudis

Some people prefer books that deliver a wealth of theoretical knowledge they can build on, while other always go for the hands-on experience. This course is all hands-on …

Interview with Billy Barron, co-author of “Maximum Security 4/e”

Who is Billy Barron? Introduce yourself to our readers. I am a 15 year veteran of the computer industry. What’s unique about my background is that I’ve spent about …

Trusted Debian v1.0 officially released

The Trusted Debian project aims to create a highly secure but usable Linux platform. To accomplish this, the project will use currently available security solutions for Linux …

NetBSD 1.6.1 has been released

The NetBSD operating system is a full-featured, open source, UNIX-like operating system descended from the Berkeley Networking Release 2 (Net/2), 4.4BSD-Lite, and …

Interview with Andrew G. Mason, author of “Cisco Secure Virtual Private Networks”

Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, CCStudy.com (resource site for Cisco Certification), and Boxing Orange. …

Security in Computing 3/e

This senior/graduate level textbook will give you a good foundation in computer security. The targeted audiences of this book are computer scientists, college students, …

Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”

Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …

PTG Interactive’s Training Course for Red Hat Linux: A Digital Seminar on CD-ROM 2/e

This interactive course will certainly introduce Red Hat Linux to a broader audience because it's definitely fun to learn this way. What's very handy is that the end of each …

Interview with Scott Barman, author of “Writing Information Security Policies”

Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …

Catapult Communications supports network security tests

Catapult Communications Corporation announced support for a SIP (Session Initiation Protocol) test suite that has been sanctioned by CERT. The Catapult DCT2000 and LANCE test …

IT Security: Risking the Corporation

Throughout the book the author underlines the importance of security auditing and keeping up with patches. What you get here is excellent advice packed into a book that's easy …

Don't miss

Cybersecurity news