Mirko Zorz
Interview with David W. Chapman, President and Principal Consultant for SecureNet Consulting
David W. Chapman Jr. is President and Principal consultant for SecureNet Consulting, LLC, an independent information security consulting firm in Beaverton, OR. SecureNet …
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …
Interview with Dr. Nicko van Someren, CTO of nCipher
nCipher’s CTO Dr. Nicko van Someren leads the research team and directs the technical development of nCipher products. Nicko has 20 years of experience in cryptography, …
Interview with Ratmir Timashev, CEO of Aelita Software
Ratmir Timashev brings a rare combination of business savvy and technical knowledge to his role as CEO of Aelita Software, allowing him to create a vision for the company that …
Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard
Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …
Cisco Secure PIX Firewalls
The authors state that the goal of this book is help users refresh their knowledge of basic PIX operation as well as to dwell into more advanced configurations. Do they …
PKWARE and RSA Security Enter a Strategic Alliance
Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …
Interview with Darrell D. Simms, Director of Business and Wireless Product Development at TROY Wireless
Darrell D. Simms is an acknowledged leader in the wireless industry as a technologist. He is a noted evangelist for short distance wireless technologies such as Bluetooth and …
Network Intrusion Detection 3/e
What gives this book great value is a variety of examples we get from intrusion detection mechanisms. This is much more helpful in understanding how things work than just …
Interview with Eugene Kuznetsov, Founder, President and CTO of DataPower Technology Inc.
Eugene Kuznetsov is a technology visionary who has been working to address enterprise XML issues since the late 90s. Kuznetsov founded DataPower Technology, Inc. in 1999 to …
Interview with John Zurawski, Vice President of Sales and Marketing at Authentify
John Zurawski has more than 20 years of experience in computer software, Internet and high technology. He has held prominent positions for the analytical software firm SPSS, …
Interview with Scott C. Nevins, President and CEO of Protegrity
Protegrity is a leader in database security software, delivering privacy and protection solutions for mission-critical data stored in databases. Its flagship product …