How Personal & Internet Security Works
For majority of us working in information technology, knowledge on security and privacy topics is something that we need to possess. There are hundreds, or better say it …
Trustware BufferZone 1.6
Security company Trustware has a product that takes a new approach on protecting the end users. BufferZone is centered on a concept of virtualization technology, that creates …
GFI LANguard Network Security Scanner 6
This is a review of the new release of LANguard Network Security Scanner (GFI LANguard NSS) from GFI. NSS will scan computers for known vulnerabilities and common …
The Art of Computer Virus Research and Defense
If you want to know what viruses really are, how they attack, how they are activated, and much more, this is the book to consider. This book promises to be a comprehensive …
The CISM Prep Guide: Mastering the Five Domains of Information Security Management
Certified Information Security Manager (CISM) is a certification developed by the Information Systems Audit and Control Association (ISACA). This book is a guide that is …
Trend Micro InterScan Web Security Suite (IWSS)
IWSS is a comprehensive solution tailored for large corporate deployment. It successfully addresses the main concerns of most corporate users: increased network latency …
Privacy: What Developers and IT Professionals Should Know
The book is divided in three parts and each of them has its own specific focus. The first part is dedicated to everyone interested in privacy. The second part is specific for …
Anti-Hacker Tool Kit 2/e
This book is a comprehensive guide through the field of security tools that provides advice on how to use them. The authors cover tools for auditing and prevention, detection …
Know Your Enemy: Learning about Security Threats 2/e
We all know that attackers are becoming more sophisticated and many times the security community has a hard time catching up. Honeynets are making the knowledge gap smaller …
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Wardriving is extremely important for the state of wireless security, as it shows how many unprotected WLANs are out there and is therefore directly influencing wireless …
Windows Forensics And Incident Recovery
The purpose of this book is to explain some technical information about Microsoft Windows systems with a focus on forensics audits and incident recovery. The author did a good …
Designing Network Security 2/e
This is a comprehensive guide which will help you understand the fundamentals of securing your network infrastructure. Beside theoretical knowledge, the book contains a large …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025