►Targeted
Cyber Attacks - The Dangers Faced by your Corporate Network,
by GFI Software. This security e-book explains the real
dangers posed by targeted cyber attacks and the measures
organizations can adopt to secure against such threats. |
Hackers,
Viruses, Spyware -- Oh
My!,
by Gary Knuckles. This ebook explains, in simple terms,
how to make your computer less vunerable to becoming a victim of
viruses, hackers, and other malicious online dangers. |
Learning
Red Hat Linux Security, by George M. Doss. Shows system
administrators a process to implement Red Hat Linux into an
overall security management system. |
Information
Security Best Practices - 200 Basic Rules,
by George L. Stefanek. A
source of “best practices” to follow in implementing
information security within an organization. |
How
to Make Klez Virus Writers Leave Their Bloody Work And Break
Their Heads, by Santosh Kumar S. P. Step-by-step
instructions to completely remove klez virus from your system,
along with efficient tips to protect your system.
|
The
Ultimate Virus Protection, by Santosh Kumar S. P. This
ebook focuses on how one can protect their system from potential
viruses, by following simple, easy-to-follow instructions.
|
Safety
tips for protecting kids online,
by Alex Vereshchak. Internet
filtering/ parental control software that protects kids from
harmful information on the Internet.
|
Risk
Management Kit, Jason
Westland. This
is a set of templates used to identify, quantify, track and
mitigate risks within a project.
|
Did you
find a broken link? Let
us know! |