Please turn on your JavaScript for this page to function normally.
Thecus N5550 NAS Server inside and out

Having a backup drive has become essential. Those serious about their storage needs turn to NAS devices. Like most tech available today, those range from introductory models …

Professional Penetration Testing, Second Edition

Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …

Network Security Through Data Analysis

One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …

Working with the Toshiba FlashAir II wireless SD card

With storage prices declining and the popularity of SD cards increasing, some computer makers are incorporating SD card readers into their machines. I find myself using them …

Thinking with Data: How to Turn Information into Insights

With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …

Two-factor authentication for WordPress using Rublon

Rublon provides automatic two factor authentication for web applications. It currently supports Drupal, WordPress, Magento, PrestaShop and OpenCart. Two-factor authentication …

Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001

A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the …

Knox: Mac file encryption and backup

Knox is a utility that enables you to create encrypted vaults on OS X. It's made by AgileBits, the company behind the popular password manager 1Password.

Investigating Internet Crimes

Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …

Social Media Security

I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network …

Unified Communications Forensics

“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …

The Circle

The book talks about a near future where the most significant company in the world is The Circle. They don't deal in goods, but in what we all know is the real commodity of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools