Cisco Firewalls
There used to be a time when firewalls were considered a full proof solution for protecting networks, and that time is long gone. History has taught us there are no silver …
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
If you followed our site over the years, you had the opportunity to read a little about some of the protagonists of this book: Max Vision the creator of CardersMarket, Albert …
IPv6 for Enterprise Networks
The February news that the last batch of IPv4 addresses has been distributed has resounded across the Internet as a final wake up call. It made everybody aware of the fact …
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites
The only way you could have missed the fact that the social networking boom has led to huge amounts of social data becoming available to knowledgeable searchers is if you …
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks
The management of identities and online authentication are two problems to which so far only Public Key Infrastructure (PKI) has managed to give a secure and scalable answer …
Building the Mobile Internet
It is common knowledge that the world is going mobile, and that we want to be able to connect to the Internet wherever we are. As the Internet’s original protocols and design …
Security for Microsoft Windows System Administrators
Security for Microsoft Windows System Administrators aims at teaching the reader the very basics of information security: general concepts, some cryptography, concepts and …
Computer Incident Response and Product Security
As time passes, more and more companies realize the importance of having an in-house incident response team. But how to go about forming one and organizing its functioning? …
Cisco CCENT Mind Share Game
The Cisco CCENT Mind Share Game covers key networking topics and is designed to test the players' technical knowledge and their ability to concentrate and perform under …
Acunetix Web Vulnerability Scanner 7
A manual search for vulnerabilities would simply take too much time, so penetration testers usually use an automated web vulnerability scanner to do the preliminary work for …
Securing the Smart Grid: Next Generation Power Grid Security
Smart grids are a reality and the future, and they promise greater reliability, affordability, efficiency and, hopefully, a better and environmentally cleaner exploitation of …
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking is not your typical "hacking" book. By comparing hackers with ninjas, the authors try to demonstrate how the ninja way of doing things can be translated to fit …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025