Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Securing Wireless LANs

In "Securing Wireless LANs", the author brings a number of especially technical themes and transforms them into an easily readable material for all types of readers. Some …

Introduction to UNIX and Linux

In this book John Muster will teach you how to use UNIX and Linux through clear presentation of the concepts. The subjects covered in each chapter are organized in a way the …

Moving to Linux: Kiss the Blue Screen of Death Goodbye!

What's interesting in this book is the constant comparison of Windows and Linux. This enables the reader to slide from one system to another without any fear that he is …

Implementing SSH: Strategies for Optimizing the Secure Shell

With a bunch of security features, SSH is being adopted by a great number of system administrators that are trying to implement some way of secure tunneling to their networks. …

Beginning Red Hat Linux 9

The many authors managed to squeeze into this title the most important facts for a novice user and point him into the right direction. Clearly written and amply …

The Effective Incident Response Team

With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …

Essential System Administration Pocket Reference

The title does the book justice as with its miniature size this is the most portable reference guide I've come across. If you need information while on the road or just …

Wireless Hacks

I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a …

Open Source Network Administration

You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …

PDA Security: Incorporating Handhelds into the Enterprise

This book will suit a number of readers interested in the field of PDA security in general. The authors managed to cover a broad range of topics surrounding the most popular …

Secrets of Computer Espionage: Tactics and Countermeasures

Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …

Windows XP Hacks

This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools