Reviews
  • Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001

    | by Zeljka Zorz - Friday, 21 February 2014.

    A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the different service models, strategies on cloud adoption, and touches on cloud security, privacy and compliance.

  • Knox: Mac file encryption and backup

    | by Mirko Zorz - Monday, 27 January 2014.

    Knox is a utility that enables you to create encrypted vaults on OS X. It's made by AgileBits, the company behind the popular password manager 1Password.

  • Investigating Internet Crimes

    | by Zeljka Zorz - Wednesday, 8 January 2014.

    Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through the steps of such an investigation and provides information about collecting and interpreting electronic evidence that will be used to prosecute the criminals.

  • Social Media Security

    | by Mirko Zorz - Thursday, 2 January 2014.

    I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network and share a variety of information, while companies use it to communicate with their customers.

    However, it's not all great since social media brings also copious privacy and security concerns. While individuals tend to over share sensitive information, the enterprise treads on even more sensitive ground with a varied set of potential disasters. This book presents the risks present in social networking and shows you how to mitigate them. Read on to discover how it fares.

  • Unified Communications Forensics

    | by Zeljka Zorz - Thursday, 21 November 2013.

    “Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video conferencing, data sharing, call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax),” Wikipedia explains. This book concentrates on VoIP and the attacks leveraged against it.




Spotlight

How security analytics help identify and manage breaches

Posted on 30 July 2014.  |  Steve Dodson, CTO at Prelert, illustrates the importance of security analytics in today's complex security architectures, talks about the most significant challenges involved in getting usable information from massive data sets, and much more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //