Read more about books
Bookmark and Share
  • Network Security Through Data Analysis

    03.04.2014

    Author: Michael Collins Pages: 348 Publisher: O'Reilly Media ISBN: 1449357903 Introduction One of the most crucial tasks of network administrators is to keep the network secure - or as secure as possible.

  • Thinking with Data: How to Turn Information into Insights

    19.03.2014

    Author: Max Shron Pages: 94 Publisher: O'Reilly Media ISBN: 1449362931 Introduction With the advent of computer systems and the Internet, data has become plentiful and easily accessible.

  • Free eBook: Understanding Big Data

    14.03.2014

    Automating information integration and governance and employing it at the point of data creation helps organizations boost confidence in their Big Data.

  • Free eBook: PHP 5 Power Programming

    13.03.2014

    In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project--no matter how large or complex.

  • Free eBook: Guide to secure file transfers

    27.02.2014

    If you've ever had problems with large file transfers or concerns about regulatory compliance, take a look at this eBook.




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //