The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Packt Publishing 2014;
A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized... more...
- Packt Publishing 2013; US$ 17.99
This book is a step-by-step tutorial that will teach you everything you need to know about the deployment and management of FortiGate, including high availability, complex routing, various kinds of VPN working, user authentication, security rules and controls on applications, and mail and Internet access.This book is intended for network administrators,... more...
- Packt Publishing 2013; US$ 19.99
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to... more...
- Wiley 2001; US$ 41.95
Featuring Winners of Ernst & Young's Entrepreneur Of The Year Awards In their own words . . . Jay S. Walker-priceline.com Mike McNulty and Mike Hagan-VerticalNet Christina Jones-pcOrder William Porter and Christos Cotsakos-E*Trade Gregory K. Jones-uBid Russell Horowitz-Go2Net Ken Pasternak-Knight/Trimark William Schrader-PSINet Pierre... more...
- Pearson Education 2002; US$ 51.99
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The focus of the book is on COM Interoperability (since it's a much larger subject), and the heart of the discussion is broken down into four parts: Using COM Components Within the .NET Framework Using... more...
- John Wiley & Sons, Inc. 2003; US$ 21.99
Pick the right equipment, secure your network, and share files Share your Internet connection, access hot spots, and add on cool wireless peripherals Thinking of going wireless? It's not as scary as it sounds! This fast and fun guidebook helps you decide what you need, install it, and get the most from all its cool options. Your PCs can share printers... more...
- Wiley 2011; US$ 29.99
Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like... more...
- Pearson Education 2006; US$ 19.99
Organizations that have implemented Microsoft ® Windows Active Directory ® need to make sure that Active Directory is configured and operating properly. Even an Active Directory that is properly installed can easily have components fail or stop working, which causes problems with the Windows networking environment. An organization should run an... more...
- Elsevier Science 2005; US$ 81.95
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...