Please turn on your JavaScript for this page to function normally.
Guerrilla Oracle: The Succinct Windows Perspective

Are you frustrated by your attempts to learn Oracle or improve your Oracle skills because of the sheer amount of technical documentation you have to wade through? This …

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

When taking a look at the most used security tools, one of the most popular and praised ones is surely Snort. This heavily used product is an open source Network Intrusion …

Trend Micro OfficeScan Corporate Edition

Michael Oliveri takes a look at Trend Micro OfficeScan Corporate Edition Version 3.54 and gives his take on this product. Is it right for your needs? Read on to find out.

Special Edition Using Windows XP Professional, Bestseller Edition

In the information era, the number of improvements in operating systems grows rapidly. Fighting with our time, working all day, we spend hours and hours learning to cope with …

Oracle Performance Tuning

Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …

SonicWALL Pro

SonicWALL's line of firewalling appliances are recommended for small- to medium-sized networks in various environments. Their ease of setup and configuration make them ideal …

The Practice of Network Security: Deployment Strategies for Production Environments

Last year in an interview for ZDNet, computer security expert Bruce Schneier said: "I think we're finally past the era where people believe in magic security dust, that all …

Wireless Security End to End

The authors truly provided an end-to-end guide that should suite both the future wireless administrators (although the book isn't so technical), as well as the members of …

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

The title of this book is very descriptive, it tells you clearly what's this book about. Network analysis and monitoring consists of employing proper software and/or hardware …

Red Hat Linux Survival Guide

Red Hat Linux is by far the most popular Linux distribution and therefore many books cover it in great detail. This time I went through a book that's not massive in size as …

The Complete Wireless Internet and Mobile Business Programming Training Course

As technology is progressing rapidly, topics like mobile business and mobile commerce receive a lot of attention. Wireless technologies allow organizations to reach new …

The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise

The examples in this book are organized very well for easy access. This is a perfect reference guide both for system administrators and home users that want to solve problems …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools