Please turn on your JavaScript for this page to function normally.
Computer Security Basics (2nd Edition)

Computer books usually tend to fit into two categories: immense titles that try to contain everything you might need or highly specialized books on a single topic. This book …

Lavasoft Digital Lock

Lavasoft is a company well known for their flagship product Ad-Aware, one of the early software programs that dealt with spyware and adware threats. In 2007 they switched …

Cisco Networking Simplified (2nd Edition)

Although the vast majority of Cisco Press titles are geared towards intermediate and advanced readers that can solve complex network issues at 3 AM on a Sunday, this is one of …

Linux Administration Handbook (2nd Edition)

This 1000+ pages guide is concentrated on one sole thing - expanding and upgrading your knowledge on administration of different Linux operating systems. As with this kind of …

Networking with Microsoft Windows Vista

Although Windows Vista is not being adopted as fast as Windows XP was back in the day, this operating system is undoubtedly gaining ground and being introduced into places …

Endpoint Security

Endpoint security is currently one of the "hot topics" in the information security market. Often neglected, this vital part of your company network organization can very …

Designing BSD Rootkits: An Introduction to Kernel Hacking

This book covers a very technical and fascinating topic that hasn't received much bookshelf space before this book was released. This title aims to give you the knowledge …

Fuzzing: Brute Force Vulnerability Discovery

Although fuzzing may sound like a new concept to some, the term is related to a concept that has been around for a couple of decades. It became famous in the past year as a …

The Craft of System Security

Computer security is an immense topic and there are thousands of books available that cover every possible technology and tool on the market. What makes this book different …

Security Data Visualization

The visualization of security data is useful to the modern security analyst, and it will certainly become essential in certain environments very soon. Never has there been …

LAN Switch Security: What Hackers Know About Your Switches

The majority of security books reviewed on Help Net Security are focused on specific technologies, software platforms and hot security issues everyone is talking about. Cisco …

Ubuntu Linux for Non-Geeks (2nd Edition)

Many still believe that using Linux requires some advanced knowledge and that it's far for being user friendly. With time, user friendliness has become an important part of …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools