Open Source Network Administration
You would think that with all the information that comes with a Linux or Unix operating system and the wealth of information that can be found online that a book of this type …
PDA Security: Incorporating Handhelds into the Enterprise
This book will suit a number of readers interested in the field of PDA security in general. The authors managed to cover a broad range of topics surrounding the most popular …
Secrets of Computer Espionage: Tactics and Countermeasures
Despite the title that may lead you to believe this is a manual used in the National Security Agency (NSA), this is actually a book for anyone worried about the security of …
Windows XP Hacks
This is probably the single most valuable book about Windows XP you'll ever come across. If you're a complete novice to this version of Windows, you'll have to get more …
Red Hat Linux Pocket Administrator
As it is always with this kind of a pocket reference type of books, you'll either love 'em or hate 'em. They don't hold enough information about the topics they are covering, …
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
With the development of wireless technology, wireless security issues become more and more important. This book helps you to understand how wireless network security operates …
Incident Response: Computer Forensics Toolkit
At the end of every year I read reports on almost all computer security related news outlets that promise more incidents, vulnerabilities and viruses in the upcoming year. …
HackNotes Linux and Unix Security Portable Reference
Written by an experienced information security consultant, this portable reference delivers just the things we expect from this kind of a publication: important and up-to-date …
Secure Coding: Principles & Practices
The security issues and challenges facing information technology today have their roots in the software development process. One might say that's the root of all evil - or …
HackNotes Windows Security Portable Reference
If you want to learn more about Windows security, there's a plethora of security books out there you can use. Most of these titles are large volumes that contain information …
Red Hat Linux 9 Unleashed
To be honest, I don't like books that try to cover all about one complex system such as a new version of Red Hat Linux, although I must admit I did enjoy this book. You get a …
802.11 Security
Spread over just about 190 pages, "802.11 Security" is an easy to read technical guide that goes directly to the point and presents the reader with practical step-by-step …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025