Build Your Own Server
I've had the pleasure of reading several books that build system administration skills essential for successfully managing a system. This time I went through a title that …
WiFi Security
The general opinion of both IT professionals and media outlets is that there is no wireless security, but that is just a superficial look on this technology. Books like the …
The Complete C++ Training Course 4/e
This course could just be the right one to show that object orientation is the most efficient approach to solving software engineering problems. In this sense, it's an …
Securing Business Information: Strategies to Protect the Enterprise and Its Network
This book is published as a part of the IT Best Practices Series, and it is focused on the information technology in dynamic business environment. This book is a "step by …
Microsoft Windows Server 2003 Unleashed
Introducing a new era of computer networking Rand Morimoto and other esteemed authors put their own experience and knowledge in one place. If you are familiar with NT or …
TCP/IP Unleashed
With over 1000 pages, this book is a big and heavy volume. "TCP/IP Unleashed (third edition)" is an attempt to collect all information about the TCP/IP protocol suite and its …
Guerrilla Oracle: The Succinct Windows Perspective
Are you frustrated by your attempts to learn Oracle or improve your Oracle skills because of the sheer amount of technical documentation you have to wade through? This …
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
When taking a look at the most used security tools, one of the most popular and praised ones is surely Snort. This heavily used product is an open source Network Intrusion …
Special Edition Using Windows XP Professional, Bestseller Edition
In the information era, the number of improvements in operating systems grows rapidly. Fighting with our time, working all day, we spend hours and hours learning to cope with …
Oracle Performance Tuning
Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …
SonicWALL Pro
SonicWALL's line of firewalling appliances are recommended for small- to medium-sized networks in various environments. Their ease of setup and configuration make them ideal …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)