Please turn on your JavaScript for this page to function normally.
RSA Security Supports Microsoft Security Initiatives

RSA Security offered support for Microsoft Corp.’s newly announced enhanced security initiatives, including a commitment to continued product development and industry …

Interview with Jamie Cameron, author of “Managing Linux Systems with Webmin”

Who is Jamie Cameron? Introduce yourself to our readers. I’m Australian, 29 years old, and have been interested in or working with computers and programming since I got …

Interview with Jason Reid, author of “Secure Shell in the Enterprise”

Jason Reid is a Member of Technical Staff with Sun Microsystems. There he tests software and writes for the Sun BluePrints program. His start in security began as a Unix …

Linux Security Cookbook

If you work with Linux you certainly know of many resources where you can get your questions answered when running into a problem. When it comes to securing your Linux box, …

New Automated 802.11 Wireless Security Software From Code Red Systems

A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …

Red Hat Linux Administration: A Beginner’s Guide

There are many books dedicated to Linux system administration. The one I'm taking a look at today is written specifically for Red Hat Linux although much of the material can …

Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”

Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …

Windows Server 2003 Security Bible

This book is a perfect choice for all you administering Windows Server 2003 machines as it deals exclusively with security. There's so much to learn and I believe the author …

Interview with John Vacca, information technology consultant and internationally known author

John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …

Linux+ Certification Bible

The aim of this book is to provide you with all the information you need to pass the CompTIA Linux+ Certification exam. The Bible series of books is very popular and always a …

Google Hacks: 100 Industrial-Strength Tips & Tools

Even if you use Google all the time, this exceptional book will show you things you didn't know were possible. Since the Internet is developing and growing quite rapidly, …

Identity Theft

Identity theft has been one of the most discussed subjects in the news during the previous year. According to the cover of this book, it's the fastest growing crime in …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools