Cyber Attacks - The Dangers Faced by your Corporate Network,
by GFI Software. This security e-book explains the real
dangers posed by targeted cyber attacks and the measures
organizations can adopt to secure against such threats.
Viruses, Spyware -- Oh
by Gary Knuckles. This ebook explains, in simple terms,
how to make your computer less vunerable to becoming a victim of
viruses, hackers, and other malicious online dangers.
Red Hat Linux Security, by George M. Doss. Shows system
administrators a process to implement Red Hat Linux into an
overall security management system.
Security Best Practices - 200 Basic Rules,
by George L. Stefanek. A
source of “best practices” to follow in implementing
information security within an organization.
to Make Klez Virus Writers Leave Their Bloody Work And Break
Their Heads, by Santosh Kumar S. P. Step-by-step
instructions to completely remove klez virus from your system,
along with efficient tips to protect your system.
Ultimate Virus Protection, by Santosh Kumar S. P. This
ebook focuses on how one can protect their system from potential
viruses, by following simple, easy-to-follow instructions.
tips for protecting kids online,
by Alex Vereshchak. Internet
filtering/ parental control software that protects kids from
harmful information on the Internet.
Management Kit, Jason
is a set of templates used to identify, quantify, track and
mitigate risks within a project.
| Did you
find a broken link? Let