The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Botnet Detectionby Wenke Lee; Cliff Wang; David Dagon

    Springer 2007; US$ 169.00

    Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is... more...

  • Role-Based Access Controlby David F. Ferraiolo

    Artech House 2007; US$ 89.00

    Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very... more...

  • Oracle Identity Managementby Marlin B. Pohlman

    Taylor and Francis 2008; US$ 85.95

    In today?s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner workings of that organization. Oracle Identity Management:... more...

  • Insider Attack and Cyber Securityby Salvatore J. Stolfo; Steven M. Bellovin; Angelos D. Keromytis

    Springer 2008; US$ 169.00

    Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.... more...

  • Multivariate Public Key Cryptosystemsby Jintai Ding; Jason E. Gower; Dieter S. Schmidt

    Springer 2006; US$ 169.00

    Multivariate Public Key Cryptosystems (MPKC) schemes are seen as a possible alternative to number theoretic-based cryptosystems such as RSA. Covering this subject, this book serves as a guide for understanding what is needed to implement these cryptosystems for practical applications. It is intended for researchers, students, and others. more...

  • Privacy-Respecting Intrusion Detectionby Ulrich Flegel

    Springer 2007; US$ 169.00

    With our society's growing dependency on information technology systems (IT), the issue of IT Security becomes increasingly important. This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. more...

  • Quality Of Protectionby Dieter Gollmann; Fabio Massacci; Artsiom Yautsiukhin

    Springer 2008; US$ 259.00

    Discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. This work is also suitable for advanced-level students in computer science. more...

  • Synchronizing Internet Protocol Security (SIPSec)by Charles A. Shoniregun

    Springer 2007; US$ 169.00

    Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This volume... more...

  • AVIEN Malware Defense Guide for the Enterpriseby David Harley

    Elsevier Science 2011; US$ 62.95

    Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large... more...

  • Malware Forensicsby Cameron H. Malin; Eoghan Casey; James M. Aquilina

    Elsevier Science 2008; US$ 69.95

    Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system,... more...