Please turn on your JavaScript for this page to function normally.
Moving to Linux: Kiss the Blue Screen of Death Goodbye!

What's interesting in this book is the constant comparison of Windows and Linux. This enables the reader to slide from one system to another without any fear that he is …

Implementing SSH: Strategies for Optimizing the Secure Shell

With a bunch of security features, SSH is being adopted by a great number of system administrators that are trying to implement some way of secure tunneling to their networks. …

Beginning Red Hat Linux 9

The many authors managed to squeeze into this title the most important facts for a novice user and point him into the right direction. Clearly written and amply …

The Effective Incident Response Team

With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …

Essential System Administration Pocket Reference

The title does the book justice as with its miniature size this is the most portable reference guide I've come across. If you need information while on the road or just …

Wireless Hacks

I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a …

Open Source Network Administration

You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …

PDA Security: Incorporating Handhelds into the Enterprise

This book will suit a number of readers interested in the field of PDA security in general. The authors managed to cover a broad range of topics surrounding the most popular …

Secrets of Computer Espionage: Tactics and Countermeasures

Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …

Windows XP Hacks

This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …

Red Hat Linux Pocket Administrator

As it is always with this kind of a pocket reference type of books, you'll either love 'em or hate 'em. They don't hold enough information about the topics they are covering, …

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

With the development of wireless technology, wireless security issues become more and more important. This book helps you to understand how wireless network security operates …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools