Head First Networking
This book is really good example of why you shouldn't judge a book by it's cover. If you flip through it (and you're not acquainted with O'Reilly's "Head First" series), the …
The Google Way: How One Company is Revolutionizing Management As We Know It
You heard of Google, right? I'm joking of course. During the past ten years, Google has evolved from a small startup to one of the pillars of the modern day Internet. We are …
iPhone security software: iVault pro
Password and data managers are the most common iPhone security applications. The device is getting more and more users and they want to have secure data on the go. While …
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
While flying to security events around the globe, I stock myself with a couple of The Economist issues which are meant to last until the connecting flight to the next …
iPhone security software: Notes+
Notes+ is rather a simple utility - its main function is to be used as a note taking utility with a twist. The twist in this situation is a security lock which can be turned …
The Manga Guide to Databases
While writing this review, I turned my head right and visually browsed my bookshelf. Somewhere in the third row there are six different books related to databases, especially …
Networking (2nd Edition)
Computer networking is one of those subjects that is essential to computer professionals working in various fields. While there's a great deal of titles covering networking …
Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB
Amazon Web Services (AWS) is a suite of web services provided by the e-commerce giant, that offers third party developers a way to build on its technology platform. Soon after …
CCNA Wireless Official Exam Certification Guide
When it comes to getting a confirmation regarding your IT knowledge, the Cisco certification program is certainly among the first ones that come to mind. If you want to learn …
Hacking VoIP: Protocols, Attacks, and Countermeasures
VoIP has given us an affordable alternative to telecommunications providers that were charging us a small fortune for telephone calls, especially those made to international …
IPv6 Security
With the online world rapidly expanding, we are moving towards the IPv6 protocol. With this migration it becomes essential for networking professionals to gain insight into …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)