Windows Server 2003 Security Bible
This book is a perfect choice for all you administering Windows Server 2003 machines as it deals exclusively with security. There's so much to learn and I believe the author …
Linux Server Hacks
For those wanting to broad their administration horizons this title should come quite handy. This 200+ pages long book doesn't bother to cover all Linux server administration …
Installing, Troubleshooting, and Repairing Wireless Networks
When dealing with computer networks, we can expect a number of possible problems, so troubleshooting and repairing tips and tricks can come really handy in the moment of …
Linux+ Certification Bible
The aim of this book is to provide you with all the information you need to pass the CompTIA Linux+ Certification exam. The Bible series of books is very popular and always a …
Google Hacks: 100 Industrial-Strength Tips & Tools
Even if you use Google all the time, this exceptional book will show you things you didn't know were possible. Since the Internet is developing and growing quite rapidly, …
Ilium Software eWallet 3.1
eWallet is a tool that can contain all your private data in a compact and secure manner. The review is based on eWallet 3.1.OT running on a Microsoft Windows Mobile 2003 …
Building Secure Wireless Networks with 802.11
As you can see, we have yet another wireless review on Help Net Security. As more and more people are migrating their wired networks into wire-free environment, wireless …
Identity Theft
Identity theft has been one of the most discussed subjects in the news during the previous year. According to the cover of this book, it's the fastest growing crime in …
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
I thought a lot about how to start this review and I think that a quote by Niels Ferguson, the author of the "Michael" message integrity code algorithm used in TKIP, provides …
Secure Shell in the Enterprise
There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …
Practical Unix & Internet Security 3/e
The book contains numerous practical examples that help administrators understand what should be done about securing their systems and what is the best way to achieve …
Web Services Security
Web Services are appearing and dominate as new application solutions. At the same time they present great challenges for security. This book describes a union of Web Services …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)