How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
I thought a lot about how to start this review and I think that a quote by Niels Ferguson, the author of the "Michael" message integrity code algorithm used in TKIP, provides …
Secure Shell in the Enterprise
There are still telnet users but a great number of users have realized that you can use SSH to encrypt all your traffic and thus eliminate many well-known attacks. No wonder …
Practical Unix & Internet Security 3/e
The book contains numerous practical examples that help administrators understand what should be done about securing their systems and what is the best way to achieve …
Web Services Security
Web Services are appearing and dominate as new application solutions. At the same time they present great challenges for security. This book describes a union of Web Services …
Mastering Red Hat Linux 9
Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the …
MPLS and VPN Architectures, CCIP Edition
If you are a regular Help Net Security visitor, you are probably familiar with Cisco Press titles, that are intended for the readers interested in getting some kind of a Cisco …
Build Your Own Server
I've had the pleasure of reading several books that build system administration skills essential for successfully managing a system. This time I went through a title that …
WiFi Security
The general opinion of both IT professionals and media outlets is that there is no wireless security, but that is just a superficial look on this technology. Books like the …
The Complete C++ Training Course 4/e
This course could just be the right one to show that object orientation is the most efficient approach to solving software engineering problems. In this sense, it's an …
Securing Business Information: Strategies to Protect the Enterprise and Its Network
This book is published as a part of the IT Best Practices Series, and it is focused on the information technology in dynamic business environment. This book is a "step by …
Microsoft Windows Server 2003 Unleashed
Introducing a new era of computer networking Rand Morimoto and other esteemed authors put their own experience and knowledge in one place. If you are familiar with NT or …
TCP/IP Unleashed
With over 1000 pages, this book is a big and heavy volume. "TCP/IP Unleashed (third edition)" is an attempt to collect all information about the TCP/IP protocol suite and its …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025