Free eBook: OpenSSL Cookbook
If your job has something to do with security, web development, or system administration, you can’t avoid having to deal with OpenSSL on at least some level. This book …
The Basics of Web Hacking: Tools and Techniques to Attack the Web
Web security is one of the hot topics that we cover quite a lot on Help Net Security and is something that generates news and catches the interest of ever growing number of …
Free eBook: First Aid Kit for Sys Admins
Have you faced any of these situations: malware infection, cracked passwords, defaced website, compromised DNS, licensing violations, stolen hardware and other issues which …
Placing the Suspect Behind the Keyboard
There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …
Computation and Storage in the Cloud: Understanding the Trade-Offs
These days, especially in the IT world, most people are familiar with the concept of cloud computing and they take advantage of it for a variety of personal and business …
Simple Steps to Data Encryption
After last week's Practical Anonymity, here is another book by Peter Loshin that you might need in this new world of ours. It's a practical, hands-on guide about how to use …
Practical Anonymity: Hiding in Plain Sight Online
With the recent surveillance scandals tied to the NSA, you can no longer be deemed paranoid or believe yourself to be overreacting if you want to find a way of keeping your …
Black Code: Inside the Battle for Cyberspace
If anyone knows what's really going on in cyberspace and which forces threaten stability and security, it's Ronald Deibert and his colleagues from the well known and reputed …
Free ebook: Introducing Windows Server 2012 R2 Preview Release
Microsoft released a free ebook by Mitch Tulloch with the Windows Server Team. Introducing Windows Server 2012 R2 Preview Release introduces new features and capabilities, …
Introduction to Cyber-Warfare
If you're looking to learn about cyber warfare, but don't know where to start, you might prefer picking up a book instead of searching for information dispersed on the …
Network Intrusion Analysis
What happens after a network intrusion is detected? What steps do you need to take? What is the proper way to react in a specific situation? The authors say their intention …
Information Security Risk Assessment Toolkit
It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility