Please turn on your JavaScript for this page to function normally.
Designing Network Security, 2nd Edition

Designing Network Security is a book that will teach you how to secure your corporate network infrastructure. Starting with security fundamentals, you'll learn how to define a …

CCNA Security 640-553 Cert Flash Cards Online

The CCNA Security 640-553 Cert Flash Cards Online is a custom flash card application loaded with 250 total questions that offer a good way to review all the objectives on the …

SSCP Video Mentor

Yet another title in the Pearson's series for interactive learning that targets users set on obtaining security certifications, SSCP Video Mentor is a combination of DVD and …

Network Security Auditing

This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security and network professionals the assessment, prevention, detection, reaction …

Eleventh Hour Security+: Exam SY0-201 Study Guide

For the people who have studied hard and are preparing for the Security+ certification exam, this book provide a handy reviewing list of all the critical information and the …

Security+ SY0-201 Video Mentor

When I glance at my bookshelf, I see many certification titles racking up an imposing number of pages, and I keep wondering why there's so little interactive material …

Securing the Borderless Network: Security for the Web 2.0 World

The future of the Web is mobile, virtualized, and collaborative. Among all the positive aspects and advantages that these changes will bring, there will also be some problems …

Mozy online backup service

Mozy (mozy.com) is an online/cloud backup service for consumers and small businesses. Read on to see how it performs.

Keynesis Lockngo Professional 4.0

Keynesis Lockngo is a portable application that encrypts and hides your portable drive on Windows AND Mac without any installation. The only thing required to activate the …

Inside Cyber Warfare: Mapping the Cyber Underworld

The latest attacks and intrusions on networks of US companies and the speculation about their origins have surely made cyber war a distinctly possible reality in the minds of …

Hacking: The Next Generation

We have all been witnessing new kinds of attacks emerging thanks to new technologies and ways of using our computers and networks. The use of social media, an increasingly …

Insidious: How trusted employees steal millions and why it’s so hard for banks to stop them

Why do employees steal? As you will see in the book, it is a combination of motivation, opportunity and attitude. But it is all underlined by the issue of trust, which is …

Don't miss

Cybersecurity news