Moving to Linux: Kiss the Blue Screen of Death Goodbye!
What's interesting in this book is the constant comparison of Windows and Linux. This enables the reader to slide from one system to another without any fear that he is …
Implementing SSH: Strategies for Optimizing the Secure Shell
With a bunch of security features, SSH is being adopted by a great number of system administrators that are trying to implement some way of secure tunneling to their networks. …
Beginning Red Hat Linux 9
The many authors managed to squeeze into this title the most important facts for a novice user and point him into the right direction. Clearly written and amply …
The Effective Incident Response Team
With every year that passes it seems that the amount of computer security incidents is bigger than ever, yet it's obvious there's more security awareness. As the incidents …
Essential System Administration Pocket Reference
The title does the book justice as with its miniature size this is the most portable reference guide I've come across. If you need information while on the road or just …
Wireless Hacks
I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a …
Open Source Network Administration
You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …
PDA Security: Incorporating Handhelds into the Enterprise
This book will suit a number of readers interested in the field of PDA security in general. The authors managed to cover a broad range of topics surrounding the most popular …
Secrets of Computer Espionage: Tactics and Countermeasures
Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …
Windows XP Hacks
This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …
Red Hat Linux Pocket Administrator
As it is always with this kind of a pocket reference type of books, you'll either love 'em or hate 'em. They don't hold enough information about the topics they are covering, …
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
With the development of wireless technology, wireless security issues become more and more important. This book helps you to understand how wireless network security operates …
Featured news
Resources
Don't miss
- How global collaboration is hitting cybercriminals where it hurts
- Vet: Open-source software supply chain security tool
- Bankers Association’s attack on cybersecurity transparency
- Attackers breached ConnectWise, compromised customer ScreenConnect instances
- Product showcase: Smarter pentest reporting and exposure management with PlexTrac