Mirko Zorz
Interview with Andrew G. Mason, author of “Cisco Secure Virtual Private Networks”
Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, CCStudy.com (resource site for Cisco Certification), and Boxing Orange. …
Security in Computing 3/e
This senior/graduate level textbook will give you a good foundation in computer security. The targeted audiences of this book are computer scientists, college students, …
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”
Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …
PTG Interactive’s Training Course for Red Hat Linux: A Digital Seminar on CD-ROM 2/e
This interactive course will certainly introduce Red Hat Linux to a broader audience because it's definitely fun to learn this way. What's very handy is that the end of each …
Interview with Scott Barman, author of “Writing Information Security Policies”
Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …
Catapult Communications supports network security tests
Catapult Communications Corporation announced support for a SIP (Session Initiation Protocol) test suite that has been sanctioned by CERT. The Catapult DCT2000 and LANCE test …
IT Security: Risking the Corporation
Throughout the book the author underlines the importance of security auditing and keeping up with patches. What you get here is excellent advice packed into a book that's easy …
SSH Demonstrates QuickSec Toolkit Integration With MontaVista Linux
The SSH QuickSec Toolkit Family is specifically designed to let network device developers and OEMs quickly and easily implement IPSec functionality. Optimized and validated …
Interview with Earl Carter, Member of Cisco’s Security Technologies Assessment Team (STAT)
Who is Earl Carter? I am a security research engineer who is a member of Cisco’s Security Technologies Assessment Team (STAT). Our team examines Cisco products for …
Hacking Exposed: Network Security Secrets & Solutions 4/e
With every edition this books keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course …
Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”
Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …
Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”
Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility