The Leading eBooks Store Online

3,725,826 members ⚫ 1,209,635 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Secure Telematic Applications for National Scale Projectsby J.-G. Fontaine; M. Makhaniok

    IOS Press 2009; US$ 167.00

    The NATO Advances Research Workshop 'Secure Telematic Applications for National Scale Projects' is organized in the frame of National Week of Information Technologies and 6th International Congress 'Scientific and Methodological Facilitation of the Development of Informatization and the System of Scientific and Technical Information in... more...

  • Identity-Based Cryptographyby M. Joye; G. Neven

    IOS Press 2008; US$ 145.00

    Offers an overview of the state-of-the-art in identity-based cryptography. more...

  • Information Security Governanceby Krag Brotby

    Wiley 2009; US$ 101.95 US$ 88.36

    The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated... more...

  • Building Internet Firewallsby Elizabeth D. Zwicky; Simon Cooper; D. Brent Chapman

    O'Reilly Media 2000; US$ 47.99

    In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal... more...

  • Programming .NET Securityby Adam Freeman; Allen Jones

    O'Reilly Media 2003; US$ 39.99

    With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of... more...

  • SQL Injection Attacks and Defenseby Justin Clarke-Salt

    Elsevier Science 2009; US$ 59.95

    Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities... more...

  • Computer and Information Security Handbookby John R. Vacca; John R. Vacca

    Elsevier Science 2009; US$ 127.95

    Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and... more...

  • Network Security Bibleby Eric Cole

    Wiley 2011; US$ 59.99 US$ 52.99

    The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods... more...

  • 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Themby Michael Howard; David LeBlanc; John Viega

    McGraw-Hill Education 2009; US$ 55.00

    "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years... more...

  • Information Security Risk Management for ISO 27001/ISO 17799by Alan Calder; Steve Watkins

    IT Governance Publishing 2007; US$ 45.95

    While this book's detailed guidance will enable anyone to carry out an ISO27001-compliant risk assessment, it also draws on the complementary guidance of ISO 17799,  BS7799-3, ISO 13335-3, NIST SP 800-30 and the UK's Risk Assessment Standard to provide the most comprehensive information security risk assessment, analysis... more...