Security Metrics: Replacing Fear, Uncertainty, and Doubt
In the modern enterprise environment, investing in security and implementing is properly is a complex process that has to be based on certain metrics. Furthermore, how can one …
Certified Ethical Hacker Exam Prep
This title takes you on a tour of all the areas you need to be proficient in to pass the Certified Ethical Hacker exam. If you manage to absorb everything in this book, and …
Spyware Terminator 2.0
Over the years, hundreds of anti malware applications started popping out on the Internet but only the best prevailed. One of these tools is Spyware Terminator and this review …
The Practice of System and Network Administration (2nd Edition)
Despite being thick as a phone book, you'll see that this title is very clearly organized and can serve not just as a learning tool but also as an effective reference guide …
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
With the proliferation of VoIP networks and a substantial amount of FUD (Fear, Uncertainty and Doubt) that surrounds the process of implementing security on these networks, …
GFI EndPointSecurity 3
It has become very easy to bypass some default system barriers and easily move potentially insecure pieces of software from the device to a specific computer, or vice versa, …
Advanced Host Intrusion Prevention with CSA
Cisco Security Agent software protects server and desktop computing systems by identifying threats and preventing malicious behavior. It mitigates new and evolving threats …
Acunetix Web Vulnerability Scanner 4.0
Acunetix Web Vulnerability Scanner 4 is a powerful and versatile scanner that proves to be an important piece of a web application-testing arsenal. As always with penetration …
How Personal & Internet Security Works
For majority of us working in information technology, knowledge on security and privacy topics is something that we need to possess. There are hundreds, or better say it …
Trustware BufferZone 1.6
Security company Trustware has a product that takes a new approach on protecting the end users. BufferZone is centered on a concept of virtualization technology, that creates …
GFI LANguard Network Security Scanner 6
This is a review of the new release of LANguard Network Security Scanner (GFI LANguard NSS) from GFI. NSS will scan computers for known vulnerabilities and common …
The Art of Computer Virus Research and Defense
If you want to know what viruses really are, how they attack, how they are activated, and much more, this is the book to consider. This book promises to be a comprehensive …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)