The Effective Incident Response Team
With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …
Essential System Administration Pocket Reference
The title does the book justice as with its miniature size this is the most portable reference guide I've come across. If you need information while on the road or just …
Wireless Hacks
I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a …
Open Source Network Administration
You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …
PDA Security: Incorporating Handhelds into the Enterprise
This book will suit a number of readers interested in the field of PDA security in general. The authors managed to cover a broad range of topics surrounding the most popular …
Secrets of Computer Espionage: Tactics and Countermeasures
Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …
Windows XP Hacks
This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …
Red Hat Linux Pocket Administrator
As it is always with this kind of a pocket reference type of books, you'll either love 'em or hate 'em. They don't hold enough information about the topics they are covering, …
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
With the development of wireless technology, wireless security issues become more and more important. This book helps you to understand how wireless network security operates …
Incident Response: Computer Forensics Toolkit
At the end of every year I read reports on almost all computer security related news outlets that promise more incidents, vulnerabilities and viruses in the upcoming year. …
HackNotes Linux and Unix Security Portable Reference
Written by an experienced information security consultant, this portable reference delivers just the things we expect from this kind of a publication: important and up-to-date …
Secure Coding: Principles & Practices
The security issues and challenges facing information technology today have their roots in the software development process. One might say that's the root of all evil - or …