Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Web Security Field Guide

This "Field guide" should be of interest to the novice and inter-mediate readers interested in enchancing the security of their Microsoft based installations. If you like to …

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses

If you're in charge of the security of a network or just a security enthusiast, you'll find this book of great value. The specific tools and techniques described in this book …

Managing Information Security Risks: The OCTAVE Approach

This book is a powerful documentation on CERT/CC's Operationally Critical Threat, Asset, and Vulnerability Evaluation. It offers all the information you need to know while …

Firewalls and Internet Security: Repelling the Wily Hacker 2/e

The title of the book, "Firewalls and Internet Security" may point someone into believing that the book is about firewalls and their part in the Internet Security sphere. That …

Cisco Secure PIX Firewalls

The authors state that the goal of this book is help users refresh their knowledge of basic PIX operation as well as to dwell into more advanced configurations. Do they …

Network Intrusion Detection 3/e

What gives this book great value is a variety of examples we get from intrusion detection mechanisms. This is much more helpful in understanding how things work than just …

Understanding PKI: Concepts, Standards, and Deployment Considerations 2/e

If you are planning to deploy PKI inside your company, "Understanding PKI" will provide an extensive amount of information you need to understand, to see how the things work. …

Adhaero Doc 1.1.8

What makes this product stand out from other security applications is it's ease of use. This is the way to protect your valuable information - easy, efficient and secure.

Apache Administrator’s Handbook

There are lot of online texts covering Apache administration and Apache security, but from my perspective a book laying on your shelf gives a better and easily accessible …

LIUtilities WinBackup

WinBackup developers bundled all the needed back up functions in this small and easy to use product. If you want to secure your backups with 128 or 256 bit AES encrpytion, …

Halting the Hacker: A Practical Guide to Computer Security, 2/e

Aside it's pure technical value as a practical guide to computer security, I just love the sociological part about hacking. It will bring you a bit closer to the hacker's mind …

Wireless Security and Privacy: Best Practices and Design Techniques

Wireless security is certainly one of this year's hot topics. Everybody is talking about wardriving, warchalking, and so on. This is just the perfect time to release a book …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools