The Leading eBooks Store Online
3,812,032 members ⚫ 1,249,629 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Wiley 2011; US$ 59.99 US$ 52.99
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods... more...
- McGraw-Hill Education 2009; US$ 55.00
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years... more...
- IT Governance Publishing 2007; US$ 45.95
While this book's detailed guidance will enable anyone to carry out an ISO27001-compliant risk assessment, it also draws on the complementary guidance of ISO 17799, BS7799-3, ISO 13335-3, NIST SP 800-30 and the UK's Risk Assessment Standard to provide the most comprehensive information security risk assessment, analysis... more...
- IT Governance Ltd 2009; US$ 29.90
The insider threat poses a significant and increasing problem for organisations. The use of highly connected computers makes controlling information much more difficult than in the past. This is shown by the regular stories of data loss in the media such as the 25 million personal records mailed out by Revenue and Customs in the UK. This pocket... more...
- IT Governance Publishing 2008; US$ 348.00
This best practice report identifies all the ways in which providers and users of Web 2.0 technologies can act, to ensure that they comply with the growing range of applicable legislation, while protecting themselves from the very real exposure that all organisations have to Threat 2.0. more...
- IT Governance Publishing 2008; US$ 348.00
Data breaches: Trends, costs and best practices 2008, from IT Governance Publishing, gives you the latest information and worldwide trends in corporate data breaches - those that affect personally identifiable information and contravene laws such as the UK Data Protection Act, HIPAA and so on - and identifies best practice... more...
- O'Reilly Media 2009; US$ 31.99
What people are saying about Inside Cyber Warfare "The necessary handbook for the 21st century." --Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments "A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war." --Jim Stogdill, CTO,... more...
- O'Reilly Media 2007; US$ 39.99
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book,... more...
- IT Governance Ltd 2010; US$ 29.90
teams. Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop... more...
- Springer London 2010; US$ 139.97
With a focus on the technical issues related to digital privacy and information management, this book is an in-depth examination of how different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions. more...