Hacker’s Challenge 2: Test Your Network Security & Forensic Skills
There is a number of ways to write a security related book, and from my perspective the authors did a great job. By combining both the technical security issues with nifty …
IT Security: Risking the Corporation
Throughout the book the author underlines the importance of security auditing and keeping up with patches. What you get here is excellent advice packed into a book that's easy …
Hacking Exposed: Network Security Secrets & Solutions 4/e
With every edition this books keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course …
Essential Apache for Web Professionals
As the book is titled "Essential Apache for Web Professionals", it delivers just that - the essential easily understandable information needed for Apache administrators and …
Hack Attacks Testing: How to Conduct Your Own Security Audit
As you can see from the title, the author bases this publication on the information containing resources and methodologies needed to start your own security audits. Don't …
Red Hat Linux 8 Bible
As Linux gains more and more popularity we have books on the subject being published frequently. This is one of the latest books on Red Hat Linux 8 that, as all books do, …
Ad-aware 6.0 Professional
What a great piece of software Ad-aware is. It provides some great functionalities and I'm really impressed with the state of the Ad-watch and Proc-watch modules which make …
Maximum Security 4/e
When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …
Network Security Principles and Practices
If you are working with Cisco products, this book and all the Cisco Press security titles will be of a great use for expanding your knowledge or just introducing yourself with …
Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e
Choosing "Linux System Security" for a title of your book is surely a pretentious step. But usually, when someone picks this kind of name for a planned publication, he or she …
Personal Firewalls for Administrators and Remote Users
Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …
Writing Information Security Policies
In this book security policies are covered in a way easily readable and understandable for every interested party. If you are planning on starting or enforcing the security …
Featured news
Resources
Don't miss
- Okta users under attack: Modern phishing kits are turbocharging vishing attacks
- One-time SMS links that never expire can expose personal data for years
- More employees get AI tools, fewer rely on them at work
- Energy sector orgs targeted with AiTM phishing campaign
- Exposed training apps are showing up in active cloud attacks