Mirko Zorz
Interview with Rich Bowen, co-author of Apache Administrator’s Handbook
Hi. I’m Rich Bowen. I live in Lexington, Kentucky, and have been in this area for about 15 years. In addition to the time that I spend on geek pursuits, I enjoy hiking …
NAI Unveils ‘InfiniStream Security Forensics’ Solution
InfiniStream Security Forensics is a forensics analysis solution that allows enterprise customers worldwide to reconstruct, understand and prevent harmful network activity and …
Interview with Charles R. Elden, co-author of “Wireless Security and Privacy”
Charles R. Elden is an independent security consultant. He has worked as a manager and software security consultant with Cigital’s Software Security Group. He has …
Interview with David W. Chapman, President and Principal Consultant for SecureNet Consulting
David W. Chapman Jr. is President and Principal consultant for SecureNet Consulting, LLC, an independent information security consulting firm in Beaverton, OR. SecureNet …
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …
Interview with Dr. Nicko van Someren, CTO of nCipher
nCipher’s CTO Dr. Nicko van Someren leads the research team and directs the technical development of nCipher products. Nicko has 20 years of experience in cryptography, …
Interview with Ratmir Timashev, CEO of Aelita Software
Ratmir Timashev brings a rare combination of business savvy and technical knowledge to his role as CEO of Aelita Software, allowing him to create a vision for the company that …
Interview with Donald L. Pipkin, Information Security Architect for the Internet Security Division of Hewlett-Packard
Who is Donald L. Pipkin? I am an Information Security Architect at Hewlett-Packard. I’ve been with HP eighteen years; most of that time I have spent in the area of …
Cisco Secure PIX Firewalls
The authors state that the goal of this book is help users refresh their knowledge of basic PIX operation as well as to dwell into more advanced configurations. Do they …
PKWARE and RSA Security Enter a Strategic Alliance
Bringing together PKWARE’s ZIP compression technology and RSA BSAFE encryption technology, the two companies will develop and market best-of-breed products that combine …
Interview with Darrell D. Simms, Director of Business and Wireless Product Development at TROY Wireless
Darrell D. Simms is an acknowledged leader in the wireless industry as a technologist. He is a noted evangelist for short distance wireless technologies such as Bluetooth and …
Network Intrusion Detection 3/e
What gives this book great value is a variety of examples we get from intrusion detection mechanisms. This is much more helpful in understanding how things work than just …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace