The Leading eBooks Store Online

3,667,858 members ⚫ 1,180,414 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Shari Lawrence Pfleeger
  • 1
  • Page

Most popular at the top

  • Security in Computingby Charles P. Pfleeger; Shari Lawrence Pfleeger

    Pearson Education 2006; US$ 91.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students... more...

  • Analyzing Computer Securityby Charles P. Pfleeger; Shari Lawrence Pfleeger

    Pearson Education 2011; US$ 91.99

    ?In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today?s cybersecurity challenges. Their use of the threat?vulnerability?countermeasure paradigm combined with extensive real-world examples throughout results in a very effective... more...

  • 1
  • Page