New book: Practical Packet Analysis, 2nd Edition
Wireshark, the free and open source packet analyzer, lets users capture, examine, and reassemble packets in order to troubleshoot their network problems. But once the packets …
Spam e-books plague Amazon’s Kindle store
If you are a regular customer of Amazon’s Kindle store, you could already be aware of the fact that spammers are using it to fleece customers out of their hard-earned …
New book: MCTS Self-Paced Training Kit
Fully updated for Windows Server 2008, this 2-in-1 Training Kit delivers in-depth exam prep, including self-paced lessons, exercises, and review, practice tests on CD, and an …
New books: Windows administration, Cisco firewalls, CCNP security
Windows Small Business Server 2011 Administrator’s Companion This in-depth, one-volume guide has everything readers need to deploy and administer all aspects of Windows …
Code in the Cloud: Programming Google AppEngine
Cloud applications are the next big shift in application development: instead of building single-user applications to run on a personal computer, new applications are being …
Securing the virtual environment
In this video, Dimitri McKay, Security Architect at LogLogic, talks about vulnerabilities and the security challenges surrounding virtual environments: hyperjacking, VM …
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
If you followed our site over the years, you had the opportunity to read a little about some of the protagonists of this book: Max Vision the creator of CardersMarket, Albert …
IPv6 for Enterprise Networks
The February news that the last batch of IPv4 addresses has been distributed has resounded across the Internet as a final wake up call. It made everybody aware of the fact …
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites
The only way you could have missed the fact that the social networking boom has led to huge amounts of social data becoming available to knowledgeable searchers is if you …
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
The management of identities and online authentication are two problems to which so far only Public Key Infrastructure (PKI) has managed to give a secure and scalable answer …
Risk management cookbook
The Open Group Security Forum completed a major risk management initiative with the publication of the Cookbook for ISO/IEC 27005:2005 (registration required). The cookbook is …
Building the Mobile Internet
It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …
Featured news
Resources
Don't miss
- Fake macOS help sites push Shamos infostealer via ClickFix technique
- Why a new AI tool could change how we test insider threat defenses
- Why satellite cybersecurity threats matter to everyone
- Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
- Review: Adversarial AI Attacks, Mitigations, and Defense Strategies