Please turn on your JavaScript for this page to function normally.
STAT Scanner 5.27

A security scanner is one of the most important software titles in a network administrator's toolbox so naturally I was happy to try out a new one. When I got Harris …

Securing Systems with the Solaris Security Toolkit

This book is part of an on-going series of books known as the Sun Blueprints Program. What this publication wants to provide are best practices for securing the Solaris …

SignWise Pro 2.51

Handhelds are steadily becoming a must have for a number of organizations and because all the services they provide, we tend to cram a lot of important data on them. Some …

The Ultimate Windows Server 2003 System Administrator’s Guide

This book is a comprehensive guide. It covers fundamentals of Windows Server 2003 which are inherited from Windows 2000 administration. It brings details of planning, …

GFI LANguard Network Security Scanner 3.3

The variety of features and a simple interface make the LANguard Network Security Scanner a good scanner for any security professionals' toolbox. I think the possibility to …

HackNotes Web Security Pocket Reference

I would highly recommend this book to all those programmers who should consider security very seriously. Even if you are familiar with the usual web application security …

Securing Wireless LANs

In "Securing Wireless LANs", the author brings a number of especially technical themes and transforms them into an easily readable material for all types of readers. Some …

Introduction to UNIX and Linux

In this book John Muster will teach you how to use UNIX and Linux through clear presentation of the concepts. The subjects covered in each chapter are organized in a way the …

Moving to Linux: Kiss the Blue Screen of Death Goodbye!

What's interesting in this book is the constant comparison of Windows and Linux. This enables the reader to slide from one system to another without any fear that he is …

Implementing SSH: Strategies for Optimizing the Secure Shell

With a bunch of security features, SSH is being adopted by a great number of system administrators that are trying to implement some way of secure tunneling to their networks. …

Beginning Red Hat Linux 9

The many authors managed to squeeze into this title the most important facts for a novice user and point him into the right direction. Clearly written and amply …

The Effective Incident Response Team

With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …

Don't miss

Cybersecurity news