Please turn on your JavaScript for this page to function normally.
Ubuntu Unleashed 2012 Edition

Ubuntu Unleashed is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been …

Computer Security Fundamentals, 2nd Edition

This book brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. It …

Google+: The Missing Manual

If you want to gain more control over your social networking activities with Google+, this jargon-free guide helps you quickly master the ins and outs of the site. Learn how …

Network Security First-Step, 2nd Edition

With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively …

Low Tech Hacking

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that …

The Information Diet

The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the …

iPhone: The Missing Manual

With the iOS5 software and the new iPhone 4S device, Apple has another world-class hit on its hands. This pocket computer comes with everything—cellphone, iPod, Internet, …

Microsoft SharePoint 2010: Deploying Cloud-Based Solutions

Take your Microsoft SharePoint solutions to the cloud and gain scalability and high availability while helping to lower your operational costs. Led by a SharePoint expert, …

Preventing Good People From Doing Bad Things

As the number of known security breaches seemingly rises exponentially with every passing day, business managers and the general public are becoming increasingly aware of a …

The Linux Command Line

Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, …

CompTIA Network+ N10-005 Authorized Cert Guide

CompTIA Network+ N10-005 Authorized Cert Guide is an exam study guide. Best-selling author and expert instructor Kevin Wallace shares preparation hints and test-taking tips, …

BackTrack 5 Wireless Penetration Testing

If you're considering a career in penetration testing, you probably already know that BackTrack is the Linux distribution favored by most pentesters due to it being preloaded …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools