Spoofing Server-Server Communication: How You Can Prevent It
A New Prescription for Privacy: Understanding and Meeting Security Requirements for Electronic Health Records
Perfect Forward Secrecy – The Next Step in Data Security
Website Security for Dummies
The Shortcut Guide to Business Security Measures Using SSL
Designed for IT professionals and business managers, this guide provides an overview of security threats, their impact on businesses, and, perhaps most importantly, practices and technologies for controlling security risks. The first chapter begins wit…
Drones for Dummies (FREE eBook Valued at $16.99) Plus a Chance to Win a Parrot Bebop Drone!
Ready to soar into the world of unmanned aircraft? Drones For Dummies introduces you to the fascinating world of UAVs. Written in plain English and brimming with friendly instruction, Drones For Dummies provides you with the information you need to fin…
Reduce Your Open Source Security Risk: Strategies, Tactics, and Tools
There’s no doubt that open source software (OSS) is here to stay, but that doesn’t mean that developers can feel free to use all and any open source software components with no thought to the vulnerabilities and security issues they may int…
Finding Hard-to-Reproduce Bugs with Reverse Debugging
Debugging is the most time-consuming and costly phase of the software development lifecycle. The hardest step in solving software bugs is working backward from a software failure to the original program error. Conventional debugging techniques allow us…
Collaboration Trends & Challenges: The Enterprise IT Perspective
There’s no doubt that collaboration tools are critical for any business. But how are IT leaders actually using collaboration tools in their organizations? Join our upcoming webcast on December 2 at 2pm ET/11am PT and hear real-world applications from a…





