Ad-aware 6.0 Professional
What a great piece of software Ad-aware is. It provides some great functionalities and I'm really impressed with the state of the Ad-watch and Proc-watch modules which make …
Maximum Security 4/e
When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …
Network Security Principles and Practices
If you are working with Cisco products, this book and all the Cisco Press security titles will be of a great use for expanding your knowledge or just introducing yourself with …
Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e
Choosing "Linux System Security" for a title of your book is surely a pretentious step. But usually, when someone picks this kind of name for a planned publication, he or she …
Personal Firewalls for Administrators and Remote Users
Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …
Writing Information Security Policies
In this book security policies are covered in a way easily readable and understandable for every interested party. If you are planning on starting or enforcing the security …
A Practical Guide to Red Hat Linux 8
What you get with this massive book is a compendious guide to Red Hat Linux 8 that covers basically everything a Red Hat user might need. I can highly recommend it to both the …
The Complete Linux Shell Programming Training Course
When you purchase this book, you're in effect purchasing a sliver of the combined knowledge of both authors in the Linux shells programming field. You'll find a lot of …
Managing Cisco Network Security
This book presents all the topics covered in the instructor-led certification preparation course with the same name - Managing Cisco Network Security (MCNS). The goal of this …
Cisco Secure Intrusion Detection System
The book offers a comprehensive guide through all the perspectives of planning, deploying and maintaining Cisco Secure IDS. While the book format cannot compete with the …
Cisco Secure Virtual Private Networks
This publication is designed to give the readers basic knowledge of planning, administering and maintaining Virtual Private Networks. As it is a written reference for the …
Featured news
Resources
Don't miss
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)