Please turn on your JavaScript for this page to function normally.
How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN

I thought a lot about how to start this review and I think that a quote by Niels Ferguson, the author of the "Michael" message integrity code algorithm used in TKIP, provides …

Secure Shell in the Enterprise

There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …

Practical Unix & Internet Security 3/e

The book contains numerous practical examples that help administrators understand what should be done about securing their systems and what is the best way to achieve …

Web Services Security

Web Services are appearing and dominate as new application solutions. At the same time they present great challenges for security. This book describes a union of Web Services …

Mastering Red Hat Linux 9

Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the …

MPLS and VPN Architectures, CCIP Edition

If you are a regular Help Net Security visitor, you are probably familiar with Cisco Press titles, that are intended for the readers interested in getting some kind of a Cisco …

Build Your Own Server

I've had the pleasure of reading several books that build system administration skills essential for successfully managing a system. This time I went through a title that …

WiFi Security

The general opinion of both IT professionals and media outlets is that there is no wireless security, but that is just a superficial look on this technology. Books like the …

The Complete C++ Training Course 4/e

This course could just be the right one to show that object orientation is the most efficient approach to solving software engineering problems. In this sense, it's an …

Securing Business Information: Strategies to Protect the Enterprise and Its Network

This book is published as a part of the IT Best Practices Series, and it is focused on the information technology in dynamic business environment. This book is a "step by …

Microsoft Windows Server 2003 Unleashed

Introducing a new era of computer networking Rand Morimoto and other esteemed authors put their own experience and knowledge in one place. If you are familiar with NT or …

TCP/IP Unleashed

With over 1000 pages, this book is a big and heavy volume. "TCP/IP Unleashed (third edition)" is an attempt to collect all information about the TCP/IP protocol suite and its …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools