Please turn on your JavaScript for this page to function normally.
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access

These days, if you find yourself at the airport, in a hotel or coffee shop, you're bound to see someone using a notebook, smartphone or PDA connected to the Internet. This is …

Linux Firewalls: Attack Detection and Response with iptables, psad and fwsnort

I think there's no need to emphasize the significance of a firewall in the overall security architecture. Countless security professionals turn to Linux when it comes to …

Virtual Honeypots: From Botnet Tracking to Intrusion Detection

In order to stay one step ahead the attackers you have to learn what they know. Honeypots enable security professionals to identify potential risks and improve their defensive …

Ubuntu Unleashed (2nd Edition)

According to the 2007 Desktop Linux Survey, 30 percent of the respondents are using Ubuntu, and this makes it the most popular desktop Linux distribution. With such a large …

Security Metrics: Replacing Fear, Uncertainty, and Doubt

In the modern enterprise environment, investing in security and implementing is properly is a complex process that has to be based on certain metrics. Furthermore, how can one …

Certified Ethical Hacker Exam Prep

This title takes you on a tour of all the areas you need to be proficient in to pass the Certified Ethical Hacker exam. If you manage to absorb everything in this book, and …

Spyware Terminator 2.0

Over the years, hundreds of anti malware applications started popping out on the Internet but only the best prevailed. One of these tools is Spyware Terminator and this review …

The Practice of System and Network Administration (2nd Edition)

Despite being thick as a phone book, you'll see that this title is very clearly organized and can serve not just as a learning tool but also as an effective reference guide …

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

With the proliferation of VoIP networks and a substantial amount of FUD (Fear, Uncertainty and Doubt) that surrounds the process of implementing security on these networks, …

GFI EndPointSecurity 3

It has become very easy to bypass some default system barriers and easily move potentially insecure pieces of software from the device to a specific computer, or vice versa, …

Advanced Host Intrusion Prevention with CSA

Cisco Security Agent software protects server and desktop computing systems by identifying threats and preventing malicious behavior. It mitigates new and evolving threats …

Acunetix Web Vulnerability Scanner 4.0

Acunetix Web Vulnerability Scanner 4 is a powerful and versatile scanner that proves to be an important piece of a web application-testing arsenal. As always with penetration …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools