Please turn on your JavaScript for this page to function normally.
Authentication: From Passwords to Public Keys
I can recommend it as a good starting point for all interested, as it will prove to be more than sufficient for all network professionals and those aspiring to become one, but …
Computer Forensics: Incident Response Essentials
If computer forensics classes start to pop up massively, this will be the book to base them on. Nothing can prove to be a substitute for experience, but it will point the …
Linux System Administration – A User’s Guide
This is a fine book on system administration, with more information than you'll likely ever need. It also serves as a great pointer and reference guide. However, don't expect …