UNIX: Visual QuickStart Guide 2/e
There's a myriad of online documentation and books out there that can help you get into UNIX. This book is different as it concentrates on teaching using a lot of screenshots …
Deploying License-Free Wireless Wide-Area Networks
This is a very good guide aimed to the IT savvy people interested in planning and deploying broadband wireless Wide Area Networks. The publications should also be of interest …
Inside the Security Mind: Making the Tough Decisions
We are all at risk. This is the state of things and it will not change. What can change is our way of thinking about security issues and the way we approach them. Security is …
Hacking Exposed Linux 2/e
The Hacking Exposed security titles don't need any introduction. Written by the experts in the security field, they provide loads of information as seen from both perspectives …
Windows XP Professional Security
The real value of this book is in the practical knowledge that it contains. It's well written and easy to use, a truly excellent resource for system administrators and a great …
Apache Server 2.0: The Complete Reference
Brian Behlendorf, one of the co-founders of Apache said about the author of this book - "Ryan Bloom (the book's author) knows the internals of the 2.0 HTTP server at least as …
Linux Administration Handbook
The review you're about to read is the Linux-only version of the "Unix Administration Handbook". Proven concepts have been taken from that book along with the addition of a …
Viruses Revealed
This is one of the rare books covering the world of computer viruses and related malware in so much detail. It is well structured, well organized and provides a thorough …
The Art of Deception: Controlling the Human Element of Security
Kevin Mitnick is one of the best-known figures in the world of computer security. There's a lot of controversy surrounding Mitnick - some regard him as a hacker, others as a …
Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit 2/e
Every day we are introduced to new security vulnerabilities, successful hacking stories and predictions that things will go from bad to worse. The continuing growth of the …
The Hack-Counter Hack Training Course: A Network Security Seminar from Ed Skoudis
Some people prefer books that deliver a wealth of theoretical knowledge they can build on, while other always go for the hands-on experience. This course is all hands-on …
Cisco Secure Internet Security Solutions
Cisco Systems is a huge organization and their products are used in a huge number of companies around the globe. Besides the general networking equipment, Cisco is well known …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine