Securing Wireless LANs
In "Securing Wireless LANs", the author brings a number of especially technical themes and transforms them into an easily readable material for all types of readers. Some …
Introduction to UNIX and Linux
In this book John Muster will teach you how to use UNIX and Linux through clear presentation of the concepts. The subjects covered in each chapter are organized in a way the …
Moving to Linux: Kiss the Blue Screen of Death Goodbye!
What's interesting in this book is the constant comparison of Windows and Linux. This enables the reader to slide from one system to another without any fear that he is …
Implementing SSH: Strategies for Optimizing the Secure Shell
With a bunch of security features, SSH is being adopted by a great number of system administrators that are trying to implement some way of secure tunneling to their networks. …
Beginning Red Hat Linux 9
The many authors managed to squeeze into this title the most important facts for a novice user and point him into the right direction. Clearly written and amply …
The Effective Incident Response Team
With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …
Essential System Administration Pocket Reference
The title does the book justice as with its miniature size this is the most portable reference guide I've come across. If you need information while on the road or just …
Wireless Hacks
I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a …
Open Source Network Administration
You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …
PDA Security: Incorporating Handhelds into the Enterprise
This book will suit a number of readers interested in the field of PDA security in general. The authors managed to cover a broad range of topics surrounding the most popular …
Secrets of Computer Espionage: Tactics and Countermeasures
Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …
Windows XP Hacks
This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)