The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Next Generation SSH2 Implementationby Dale Liu

    Elsevier Science 2011; US$ 46.95

    New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features... more...

  • The Official CHFI Study Guide (Exam 312-49)by Dave Kleiman

    Elsevier Science 2011; US$ 62.95

    This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their... more...

  • Inleiding tot de Latijnse Syntaxisby Mieke Koenen

    Amsterdam University Press 2007; US$ 37.90

    The ultimate textbook for latin syntax based on a successful teaching method. more...

  • Secure Telematic Applications for National Scale Projectsby J.-G. Fontaine; M. Makhaniok

    IOS Press 2009; US$ 167.00

    The NATO Advances Research Workshop 'Secure Telematic Applications for National Scale Projects' is organized in the frame of National Week of Information Technologies and 6th International Congress 'Scientific and Methodological Facilitation of the Development of Informatization and the System of Scientific and Technical Information in... more...

  • Identity-Based Cryptographyby M. Joye; G. Neven

    IOS Press 2008; US$ 145.00

    Offers an overview of the state-of-the-art in identity-based cryptography. more...

  • Information Security Governanceby Krag Brotby

    Wiley 2009; US$ 101.95

    The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated... more...

  • Building Internet Firewallsby Elizabeth D. Zwicky; Simon Cooper; D. Brent Chapman

    O'Reilly Media 2000; US$ 47.99

    In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal... more...

  • Programming .NET Securityby Adam Freeman; Allen Jones

    O'Reilly Media 2003; US$ 39.99

    With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of... more...

  • SQL Injection Attacks and Defenseby Justin Clarke

    Elsevier Science 2009; US$ 59.95

    Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities... more...

  • Computer and Information Security Handbookby John R. Vacca; John R. Vacca

    Elsevier Science 2009; US$ 127.95

    Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and... more...