Please turn on your JavaScript for this page to function normally.
Interview with David W. Chapman, President and Principal Consultant for SecureNet Consulting

David W. Chapman Jr. is President and Principal consultant for SecureNet Consulting, LLC, an independent information security consulting firm in Beaverton, OR. SecureNet …

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses

If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …

Interview with Dr. Nicko van Someren, CTO of nCipher

nCipher’s CTO Dr. Nicko van Someren leads the research team and directs the technical development of nCipher products. Nicko has 20 years of experience in cryptography, …

Interview with Ratmir Timashev, CEO of Aelita Software

Ratmir Timashev brings a rare combination of business savvy and technical knowledge to his role as CEO of Aelita Software, allowing him to create a vision for the company that …

Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard

Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …

Cisco Secure PIX Firewalls

The authors state that the goal of this book is help users refresh their knowledge of basic PIX operation as well as to dwell into more advanced configurations. Do they …

PKWARE and RSA Security Enter a Strategic Alliance

Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …

Interview with Darrell D. Simms, Director of Business and Wireless Product Development at TROY Wireless

Darrell D. Simms is an acknowledged leader in the wireless industry as a technologist. He is a noted evangelist for short distance wireless technologies such as Bluetooth and …

Network Intrusion Detection 3/e

What gives this book great value is a variety of examples we get from intrusion detection mechanisms. This is much more helpful in understanding how things work than just …

Interview with Eugene Kuznetsov, Founder, President and CTO of DataPower Technology Inc.

Eugene Kuznetsov is a technology visionary who has been working to address enterprise XML issues since the late 90s. Kuznetsov founded DataPower Technology, Inc. in 1999 to …

Interview with John Zurawski, Vice President of Sales and Marketing at Authentify

John Zurawski has more than 20 years of experience in computer software, Internet and high technology. He has held prominent positions for the analytical software firm SPSS, …

Interview with Scott C. Nevins, President and CEO of Protegrity

Protegrity is a leader in database security software, delivering privacy and protection solutions for mission-critical data stored in databases. Its flagship product …

Don't miss

Cybersecurity news