Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Oracle Performance Tuning

Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …

SonicWALL Pro

SonicWALL's line of firewalling appliances are recommended for small- to medium-sized networks in various environments. Their ease of setup and configuration make them ideal …

The Practice of Network Security: Deployment Strategies for Production Environments

Last year in an interview for ZDNet, computer security expert Bruce Schneier said: "I think we're finally past the era where people believe in magic security dust, that all …

Wireless Security End to End

The authors truly provided an end-to-end guide that should suite both the future wireless administrators (although the book isn't so technical), as well as the members of …

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

The title of this book is very descriptive, it tells you clearly what's this book about. Network analysis and monitoring consists of employing proper software and/or hardware …

Red Hat Linux Survival Guide

Red Hat Linux is by far the most popular Linux distribution and therefore many books cover it in great detail. This time I went through a book that's not massive in size as …

The Complete Wireless Internet and Mobile Business Programming Training Course

As technology is progressing rapidly, topics like mobile business and mobile commerce receive a lot of attention. Wireless technologies allow organizations to reach new …

The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise

The examples in this book are organized very well for easy access. This is a perfect reference guide both for system administrators and home users that want to solve problems …

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks 2/e

IPSec is short for IP Security, a set of protocols developed by the Internet Engineering Task Force, is used to secure exchange of packets at the IP layer. If you're …

CCIE Security Exam Certification Guide (CCIE Self-Study)

As Cisco Systems intentionally made achieving CCIE Security certification a tough job, Cisco Press made a good choice by releasing this publication. The information compressed …

TCP/IP Bible

TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …

UNIX: Visual QuickStart Guide 2/e

There's a myriad of online documentation and books out there that can help you get into UNIX. This book is different as it concentrates on teaching using a lot of screenshots …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools