Trend Micro InterScan Web Security Suite (IWSS)
IWSS is a comprehensive solution tailored for large corporate deployment. It successfully addresses the main concerns of most corporate users: increased network latency …
Privacy: What Developers and IT Professionals Should Know
The book is divided in three parts and each of them has its own specific focus. The first part is dedicated to everyone interested in privacy. The second part is specific for …
Anti-Hacker Tool Kit 2/e
This book is a comprehensive guide through the field of security tools that provides advice on how to use them. The authors cover tools for auditing and prevention, detection …
Know Your Enemy: Learning about Security Threats 2/e
We all know that attackers are becoming more sophisticated and many times the security community has a hard time catching up. Honeynets are making the knowledge gap smaller …
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
Wardriving is extremely important for the state of wireless security, as it shows how many unprotected WLANs are out there and is therefore directly influencing wireless …
Windows Forensics And Incident Recovery
The purpose of this book is to explain some technical information about Microsoft Windows systems with a focus on forensics audits and incident recovery. The author did a good …
Designing Network Security 2/e
This is a comprehensive guide which will help you understand the fundamentals of securing your network infrastructure. Beside theoretical knowledge, the book contains a large …
Biometrics for Network Security
With all the problems related to using simple password-based authentication methods, biometrics surely has major "pros" for its implementation in enterprise networks. Can this …
Moving to the Linux Business Desktop
I've read countless articles debating whether Linux is ready for the desktop showcasing the strengths and weaknesses of this OS. This book goes beyond that discussion as the …
Samba-3 by Example: Practical Exercises to Successful Deployment
"Samba-3 by Example" is a cookbook you've been searching for. That is a slogan. And it is a fact. If you use Samba or you think of using it, this book is something you are …
802.11 Wireless Networks: The Definitive Guide
Despite providing a wealth of extensive in-depth technical pieces of information, which vary from cryptic shorts to descriptions of specific frame parts, the book is very easy …
J2EE Security for Servlets, EJBs, and Web Services
If you are a java programmer, a system administrator who is in charge of managing J2EE applications, a system architect, or a project manager you will definitely enjoy reading …
Featured news
Resources
Don't miss
- Malicious ads target Semrush users to steal Google account credentials
- NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248)
- The hidden risk in SaaS: Why companies need a digital identity exit strategy
- Critical Veeam Backup & Replication RCE vulnerability fixed, patch ASAP! (CVE-2025-23120)
- RansomHub affiliate leverages multi-function Betruger backdoor