Biometrics for Network Security
With all the problems related to using simple password-based authentication methods, biometrics surely has major "pros" for its implementation in enterprise networks. Can this …
Moving to the Linux Business Desktop
I've read countless articles debating whether Linux is ready for the desktop showcasing the strengths and weaknesses of this OS. This book goes beyond that discussion as the …
Samba-3 by Example: Practical Exercises to Successful Deployment
"Samba-3 by Example" is a cookbook you've been searching for. That is a slogan. And it is a fact. If you use Samba or you think of using it, this book is something you are …
802.11 Wireless Networks: The Definitive Guide
Despite providing a wealth of extensive in-depth technical pieces of information, which vary from cryptic shorts to descriptions of specific frame parts, the book is very easy …
J2EE Security for Servlets, EJBs, and Web Services
If you are a java programmer, a system administrator who is in charge of managing J2EE applications, a system architect, or a project manager you will definitely enjoy reading …
Exploiting Software: How to Break Code
This is a very exciting book, full of nitty-gritty details you need to be familiar with in order to understand how attackers find software holes and build exploits. These …
The Art of UNIX Programming
This is the Bible for people who regard UNIX as a religion or philosophy. This title is definitely not aimed at an beginner audience although those will less knowledge will …
HackNotes Network Security Portable Reference
This book is perfectly suited for two different types of readers: those who are working within the Information Security field and need to catch up with some of the most common …
Inside Windows Server 2003
From what I've read I can say that this book will certainly aid you in the understanding of the numerous features of Windows Server 2003 as well as issues you might encounter …
STAT Scanner 5.27
A security scanner is one of the most important software titles in a network administrator's toolbox so naturally I was happy to try out a new one. When I got Harris …
Securing Systems with the Solaris Security Toolkit
This book is part of an on-going series of books known as the Sun Blueprints Program. What this publication wants to provide are best practices for securing the Solaris …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025