The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- John Wiley & Sons, Inc. 2004; US$ 29.99
Think there's no malicious software on your computer? PC Magazine thinks you should think again. Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer--like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's... more...
- Elsevier Science 2005; US$ 51.95
This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application... more...
- Artech House 2003; US$ 89.00
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... more...
- Elsevier Science 2011; US$ 51.95
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy... more...
- Microsoft Press 2006; US$ 27.99
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs?the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team... more...
- O'Reilly Media, Inc. 2009; US$ 27.99
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs?the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide... more...
- RAND Corporation 2011; US$ 9.95
It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and... more...
- McGraw-Hill Education 2013; US$ 30.00
Don?t Let the Real Test Be Your First Test! Written by an IT security and education expert, CEH Certified Ethical Hacker Practice Exams is filled with more than 500 realistic practice exam questions based on the latest release of the Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the... more...
- No Starch Press 2011; US$ 39.95
The Metasploit Framework is a powerful suite of tools that hackers and security researchers use to investigate, exploit, and repair potential software vulnerabilities. It is the de facto solution for offensive security research and penetration testing worldwide. Metasploit: The Penetration Tester's Guide is the definitive manual for using the Metasploit... more...