Please turn on your JavaScript for this page to function normally.
Linux Security Cookbook

If you work with Linux you certainly know of many resources where you can get your questions answered when running into a problem. When it comes to securing your Linux box, …

New Automated 802.11 Wireless Security Software From Code Red Systems

A limited free download of the AirBlock 802.11 wireless security software for residential and small business networks has been made available by Code Red Systems, a provider …

Red Hat Linux Administration: A Beginner’s Guide

There are many books dedicated to Linux system administration. The one I'm taking a look at today is written specifically for Red Hat Linux although much of the material can …

Interview with Mohammed J. Kabir, author of the “Red Hat Linux Survival Guide”

Mohammed J. Kabir (prefers to be called Kabir) is the founder and CEO of EVOKNOW, Inc. His company, EVOKNOW, develops email and GIS software. Kabir also leads a consulting …

Windows Server 2003 Security Bible

This book is a perfect choice for all you administering Windows Server 2003 machines as it deals exclusively with security. There's so much to learn and I believe the author …

Interview with John Vacca, information technology consultant and internationally known author

John Vacca is an information technology consultant and internationally known author based in Pomeroy, Ohio. Since 1982, John has authored of 30 books and more than 390 …

Linux+ Certification Bible

The aim of this book is to provide you with all the information you need to pass the CompTIA Linux+ Certification exam. The Bible series of books is very popular and always a …

Google Hacks: 100 Industrial-Strength Tips & Tools

Even if you use Google all the time, this exceptional book will show you things you didn't know were possible. Since the Internet is developing and growing quite rapidly, …

Identity Theft

Identity theft has been one of the most discussed subjects in the news during the previous year. According to the cover of this book, it's the fastest growing crime in …

Edelman Cybersecurity Survey: Viruses Impact One-Third Of American Internet Users

Edelman provides comprehensive public relations and marketing services to computer security companies in the United States. They’re recent survey shows that nearly one …

Secure Shell in the Enterprise

There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …

Entrust Releases New Secure Web Portal Solution

Entrust released its latest Secure Web Portal Solution based on Entrust TruePass Version 7.0, the first Web security solution in the market today to deliver bi-directional, …

Don't miss

Cybersecurity news