Please turn on your JavaScript for this page to function normally.
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”

Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …

PTG Interactive’s Training Course for Red Hat Linux: A Digital Seminar on CD-ROM 2/e

This interactive course will certainly introduce Red Hat Linux to a broader audience because it's definitely fun to learn this way. What's very handy is that the end of each …

Interview with Scott Barman, author of “Writing Information Security Policies”

Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …

Catapult Communications supports network security tests

Catapult Communications Corporation announced support for a SIP (Session Initiation Protocol) test suite that has been sanctioned by CERT. The Catapult DCT2000 and LANCE test …

IT Security: Risking the Corporation

Throughout the book the author underlines the importance of security auditing and keeping up with patches. What you get here is excellent advice packed into a book that's easy …

SSH Demonstrates QuickSec Toolkit Integration With MontaVista Linux

The SSH QuickSec Toolkit Family is specifically designed to let network device developers and OEMs quickly and easily implement IPSec functionality. Optimized and validated …

Interview with Earl Carter, Member of Cisco’s Security Technologies Assessment Team (STAT)

Who is Earl Carter? I am a security research engineer who is a member of Cisco’s Security Technologies Assessment Team (STAT). Our team examines Cisco products for …

Hacking Exposed: Network Security Secrets & Solutions 4/e

With every edition this books keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course …

Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”

Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled …

Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”

Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A …

LT Auditor+ Security Software Bundled with Novell Netware

Blue Lance announced that a new version of LT Auditor+ has been developed exclusively for Novell and packaged with “Nakoma,” the next official release of NetWare. …

Interview with Sunil James, Manager of iDEFENSE’s Vulnerability Contributor Program

Sunil James manages iDEFENSE’s Vulnerability Contributor Program (VCP). He is a member of the company’s Technical Intelligence team. Sunil joined iDEFENSE in July …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools