Please turn on your JavaScript for this page to function normally.
Hacking Exposed: Network Security Secrets & Solutions 4/e

With every edition this books keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course …

Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”

Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …

Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”

Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …

LT Auditor+ Security Software Bundled with Novell Netware

Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …

Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program

Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …

Red Hat Linux 9 has been released

Red Hat, Inc. announced the availability of Red Hat Linux 9. Drawing from the work of the open source community, Red Hat Linux 9 allows users to take advantage of the newest …

Interview with Lisa Yeo, author of “Personal Firewalls for Administrators and Remote Users”

Lisa Yeo is a systems analyst with the Legislative Assembly Office in Edmonton, Alberta, Canada. Her start in security came in 1997 when she was made responsible for managing …

Interview with Scott Mann, co-author of Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e

Who is Scott Mann? I am a computer jockey by profession. I’ve been working with UNIX and TCP/IP for nearly 25 years. Windows for 8 years. I’m also a sometime auto …

Interview with Christopher Negus, author of “Red Hat Linux 8 Bible”

Christopher Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more than two decades. During that time, Chris worked at AT&T …

Three-Day Virtual Conference on Remote Access, VPN and Web Application Security

Rainbow Technologies announced that a trio of security experts will participate in multiple panel discussions ranging from remote access deployments to virtual private network …

Red Hat Linux 8 Bible

As Linux gains more and more popularity we have books on the subject being published frequently. This is one of the latest books on Red Hat Linux 8 that, as all books do, …

Maximum Security 4/e

When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …

Don't miss

Cybersecurity news