Identity Theft
Identity theft has been one of the most discussed subjects in the news during the previous year. According to the cover of this book, it's the fastest growing crime in …
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
I thought a lot about how to start this review and I think that a quote by Niels Ferguson, the author of the "Michael" message integrity code algorithm used in TKIP, provides …
Secure Shell in the Enterprise
There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …
Practical Unix & Internet Security 3/e
The book contains numerous practical examples that help administrators understand what should be done about securing their systems and what is the best way to achieve …
Web Services Security
Web Services are appearing and dominate as new application solutions. At the same time they present great challenges for security. This book describes a union of Web Services …
Mastering Red Hat Linux 9
Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the …
MPLS and VPN Architectures, CCIP Edition
If you are a regular Help Net Security visitor, you are probably familiar with Cisco Press titles, that are intended for the readers interested in getting some kind of a Cisco …
Build Your Own Server
I've had the pleasure of reading several books that build system administration skills essential for successfully managing a system. This time I went through a title that …
WiFi Security
The general opinion of both IT professionals and media outlets is that there is no wireless security, but that is just a superficial look on this technology. Books like the …
The Complete C++ Training Course 4/e
This course could just be the right one to show that object orientation is the most efficient approach to solving software engineering problems. In this sense, it's an …
Securing Business Information: Strategies to Protect the Enterprise and Its Network
This book is published as a part of the IT Best Practices Series, and it is focused on the information technology in dynamic business environment. This book is a "step by …
Microsoft Windows Server 2003 Unleashed
Introducing a new era of computer networking Rand Morimoto and other esteemed authors put their own experience and knowledge in one place. If you are familiar with NT or …
Featured news
Sponsored
Don't miss
- Sumo Logic discloses potential breach via compromised AWS credential
- Marina Bay Sands breach exposed data of 665,000 customers
- The 3 key stages of ransomware attacks and useful indicators of compromise
- Aqua Trivy open-source security scanner now finds Kubernetes security risks
- AI-assisted coding and its impact on developers