The Leading eBooks Store Online

3,629,807 members ⚫ 1,172,494 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • The Best of 2600, Collector's Editionby Emmanuel Goldstein

    Wiley 2009; US$ 95.00 US$ 57.00

    In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans of 2600 a compilation of fascinating—and controversial—articles. Cult... more...

  • Inleiding tot de Latijnse Syntaxisby Mieke Koenen

    Amsterdam University Press 2007; US$ 37.90

    The ultimate textbook for latin syntax based on a successful teaching method. more...

  • Secure Telematic Applications for National Scale Projectsby J.-G. Fontaine; M. Makhaniok

    IOS Press 2009; US$ 167.00

    The NATO Advances Research Workshop 'Secure Telematic Applications for National Scale Projects' is organized in the frame of National Week of Information Technologies and 6th International Congress 'Scientific and Methodological Facilitation of the Development of Informatization and the System of Scientific and Technical Information in... more...

  • Identity-Based Cryptographyby M. Joye; G. Neven

    IOS Press 2008; US$ 145.00

    Offers an overview of the state-of-the-art in identity-based cryptography. more...

  • Information Security Governanceby Krag Brotby

    Wiley 2009; US$ 101.95 US$ 88.36

    The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated... more...

  • Building Internet Firewallsby Elizabeth D. Zwicky; Simon Cooper; D. Brent Chapman

    O'Reilly Media 2000; US$ 47.99

    In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal... more...

  • Programming .NET Securityby Adam Freeman; Allen Jones

    O'Reilly Media 2003; US$ 39.99

    With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of... more...

  • SQL Injection Attacks and Defenseby Justin Clarke-Salt

    Elsevier Science 2009; US$ 59.95

    Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities... more...

  • Computer and Information Security Handbookby John R. Vacca; John R. Vacca

    Elsevier Science 2009; US$ 127.95

    Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and... more...

  • Network Security Bibleby Eric Cole

    Wiley 2011; US$ 59.99 US$ 41.99

    The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods... more...