Feeds

Security can come cheaply

Get ahead of the curve

  • alert
  • submit to reddit

Security has always been a major factor in IT and continues to grow in importance.

Recent government data slip-ups have only served to emphasise that security is key, whether on your home PC or in a large scale corporate system. There is little room for error and the damage can be irreparable if your systems are breached, so every little bit of information can help.

We've selected a few choice titles below - including a couple of our new Online Learning courses - that cover some form of security, so you can ensure your knowledge is complete. With 40 per cent off* the RRP, security can come cheaply.

  • Foundations of Security: What Every Programmer Needs to Know
    This book helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks.
  • Hacking: The Art of Exploitation
    Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, this book introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment - all without modifying your current operating system.
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
    Hacker extraordinaire Kevin Mitnick delivers the encore to his bestselling The Art of Deception, which presented fictionalised case studies to illustrate how savvy computer crackers use "social engineering" to compromise technically secure computer systems. This new book goes one step further, offering hair-raising stories of real-life computer break-ins and showing how the victims could have prevented them.
  • Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
    This new volume in the industry-standard "Hacking Exposed" series reveals security vulnerabilities in the new generation of Web-based services. Learn all the details of the latest hacks and attacks alongside in-depth countermeasures, risk ratings, and real-world case studies. In addition, the companion website provides the latest code, scripts, tools, and software updates.
  • Penetration Tester's Open Source Toolkit Book/CD Package
    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds more than 300 new penetration testing applications to the penetration tester's toolkit and includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet, and all of the other major open source platforms.
  • Gray Hat Hacking, Second Edition
    Gray Hat Hacking, Second Edition is the only ethical hacking book on the market to provide in-depth coverage of vulnerability discovery and reverse engineering. It also offers full details on cutting-edge attack methods, hacking-related law, malware analysis, and post-exploitation survival.
  • Course 6050: Implementing Security in Windows Server 2008 (Beta)
    This online course covers the security and management part of the Windows Server 2008 online course collection. Using a rich multimedia experience coupled with comprehensive technical labs it walks you through the basics of Windows Server 2008 security including managing group policy objects, managing Windows Firewall and implementing Active Directory Certificate Services for Windows Server 2008 - all delivered direct to your inbox within minutes of placing your order.
    Course Length: 2 Hours. Subscription: 1 year
  • Collection 5354: Configuring Windows Vista™ Networking and Security
    For those of you that have moved over to Vista, security is as big an issue as it has ever been. This collection of five online courses, direct from Microsoft's development team, gives you all the information you need to configure Windows Vista networking and security. On completion of these courses you will have gained an extensive insight into the Windows Vista TCP/IP stack, network services, and security implementation.
    This collection contains Course 5355: Fundamentals of Windows Vista TCP/IP Connectivity, Course 5356: Fundamentals of Windows Vista Client-Side Network Services, Course 5357: Fundamentals of Windows Vista Security, Course 5358: Configuring and Troubleshooting Windows Vista Networking and Course 5359: Configuring and Troubleshooting Windows Vista Security.
    Collection Length: 10 Hours. Subscription: 1 year

* Offer correct at time of going to press. Offer covers selected titles only. Terms and conditions apply. ®

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.