Please turn on your JavaScript for this page to function normally.
Ad-aware 6.0 Professional

What a great piece of software Ad-aware is. It provides some great functionalities and I'm really impressed with the state of the Ad-watch and Proc-watch modules which make …

Maximum Security 4/e

When you're about to read a book that already reached its fourth edition, you know you're about to embark on an interesting journey. Since it's debut in 1997, the Maximum …

Network Security Principles and Practices

If you are working with Cisco products, this book and all the Cisco Press security titles will be of a great use for expanding your knowledge or just introducing yourself with …

Linux System Security: The Administrator’s Guide to Open Source Security Tools, 2/e

Choosing "Linux System Security" for a title of your book is surely a pretentious step. But usually, when someone picks this kind of name for a planned publication, he or she …

Personal Firewalls for Administrators and Remote Users

Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …

Writing Information Security Policies

In this book security policies are covered in a way easily readable and understandable for every interested party. If you are planning on starting or enforcing the security …

A Practical Guide to Red Hat Linux 8

What you get with this massive book is a compendious guide to Red Hat Linux 8 that covers basically everything a Red Hat user might need. I can highly recommend it to both the …

The Complete Linux Shell Programming Training Course

When you purchase this book, you're in effect purchasing a sliver of the combined knowledge of both authors in the Linux shells programming field. You'll find a lot of …

Managing Cisco Network Security

This book presents all the topics covered in the instructor-led certification preparation course with the same name - Managing Cisco Network Security (MCNS). The goal of this …

Cisco Secure Intrusion Detection System

The book offers a comprehensive guide through all the perspectives of planning, deploying and maintaining Cisco Secure IDS. While the book format cannot compete with the …

Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer

If you want to do security planning and you don't know where to start, this book is mandatory reading material. It will make your life easier and your system more secure.

Cisco Secure Virtual Private Networks

This publication is designed to give the readers basic knowledge of planning, administering and maintaining Virtual Private Networks. As it is a written reference for the …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools