Oracle Performance Tuning
Writing a good Oracle performance tuning book involves a lot of time and effort. To us, as readers, this book will offer a good fundamental knowledge and serve as a good lead …
SonicWALL Pro
SonicWALL's line of firewalling appliances are recommended for small- to medium-sized networks in various environments. Their ease of setup and configuration make them ideal …
The Practice of Network Security: Deployment Strategies for Production Environments
Last year in an interview for ZDNet, computer security expert Bruce Schneier said: "I think we're finally past the era where people believe in magic security dust, that all …
Wireless Security End to End
The authors truly provided an end-to-end guide that should suite both the future wireless administrators (although the book isn't so technical), as well as the members of …
Network Monitoring and Analysis: A Protocol Approach to Troubleshooting
The title of this book is very descriptive, it tells you clearly what's this book about. Network analysis and monitoring consists of employing proper software and/or hardware …
Red Hat Linux Survival Guide
Red Hat Linux is by far the most popular Linux distribution and therefore many books cover it in great detail. This time I went through a book that's not massive in size as …
The Complete Wireless Internet and Mobile Business Programming Training Course
As technology is progressing rapidly, topics like mobile business and mobile commerce receive a lot of attention. Wireless technologies allow organizations to reach new …
The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise
The examples in this book are organized very well for easy access. This is a perfect reference guide both for system administrators and home users that want to solve problems …
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks 2/e
IPSec is short for IP Security, a set of protocols developed by the Internet Engineering Task Force, is used to secure exchange of packets at the IP layer. If you're …
CCIE Security Exam Certification Guide (CCIE Self-Study)
As Cisco Systems intentionally made achieving CCIE Security certification a tough job, Cisco Press made a good choice by releasing this publication. The information compressed …
TCP/IP Bible
TCP/IP is the protocol suite that runs almost every network environment today. Consequently there are tons of books about TCP/IP - some deal with network implementation …
UNIX: Visual QuickStart Guide 2/e
There's a myriad of online documentation and books out there that can help you get into UNIX. This book is different as it concentrates on teaching using a lot of screenshots …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)