Is It Safe? Protecting Your Computer, Your Business, and Yourself Online
With the evolving world of the Internet, malicious activities are elevating rapidly. Majority of the attacks are targeting novice users, those who are not educated about the …
Making Things Happen: Mastering Project Management
It doesn't matter if you just got that promotion and you're supposed to oversee a project or if you're a one man band working on something, "Making Things Happen" is …
Web Security Testing Cookbook
Buying furniture on eBay, selling childhood ZX Spectrum cassette tapes, doing online banking - every service we use is powered by a robust web application. With all the …
iPhone security software – SplashKey
SplashKey is a password generator for the iPhone. This freeware comes from SplashData, a company well known in the world of mobile applications. Their software products have …
Voice over IP Security
With VoIP becoming practically a household name and present in organizations worldwide, we are witnessing a natural increase in attacks and other problems. With this title, …
Security Power Tools
By reading through security web sites, traversing through software depositories and using Google, you can keep your self updated with the latest tools and attack/defense …
Network Warrior
The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including …
Google Apps Hacks
Practically everyone on the Internet uses Google for one of its many services. Once a search engine only, today offers a variety of online tools and software titles that …
Crimeware: Understanding New Attacks and Defenses
Even as the security industry celebrates solid sales thanks to compliance laws, the last few years have not been characterized by a state of growing security. In fact, …
Big Book of Windows Hacks
When it comes to "how to" articles there's a wealth of free material available online. With the growing popularity of blogs, a myriad of people are eager to share their hacks …
Backup & Recovery
The undeniable importance of backup is the reason why system administrators invest time and effort into creating and maintaining a backup system fit for their infrastructure. …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)