Personal Firewalls for Administrators and Remote Users
Many users think that their personal computers are not susceptible to any kind of attack. Despite their belief, many computers, especially those behind a permanent broadband …
Writing Information Security Policies
In this book security policies are covered in a way easily readable and understandable for every interested party. If you are planning on starting or enforcing the security …
A Practical Guide to Red Hat Linux 8
What you get with this massive book is a compendious guide to Red Hat Linux 8 that covers basically everything a Red Hat user might need. I can highly recommend it to both the …
The Complete Linux Shell Programming Training Course
When you purchase this book, you're in effect purchasing a sliver of the combined knowledge of both authors in the Linux shells programming field. You'll find a lot of …
Managing Cisco Network Security
This book presents all the topics covered in the instructor-led certification preparation course with the same name - Managing Cisco Network Security (MCNS). The goal of this …
Cisco Secure Intrusion Detection System
The book offers a comprehensive guide through all the perspectives of planning, deploying and maintaining Cisco Secure IDS. While the book format cannot compete with the …
Cisco Secure Virtual Private Networks
This publication is designed to give the readers basic knowledge of planning, administering and maintaining Virtual Private Networks. As it is a written reference for the …
Maximum Wireless Security
While wired networks have been around for ages and have had the time to make good security defences, wireless networks and new in comparison and still have a long way to go. …
Web Security Field Guide
This "Field guide" should be of interest to the novice and inter-mediate readers interested in enchancing the security of their Microsoft based installations. If you like to …
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …
Managing Information Security Risks: The OCTAVE Approach
This book is a powerful documentation on CERT/CC's Operationally Critical Threat, Asset, and Vulnerability Evaluation. It offers all the information you need to know while …
Featured news
Resources
Don't miss
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?