The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Digital Watermarking and Steganographyby Ingemar Cox; Matthew Miller; Jeffrey Bloom; Jessica Fridrich; Ton Kalker

    Elsevier Science 2007; US$ 96.95

    Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties... more...

  • Penetration Tester's Open Source Toolkitby Jeremy Faircloth; Chris Hurley

    Elsevier Science 2007; US$ 61.95

    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications... more...

  • The Best Damn Cybercrime and Digital Forensics Book Periodby Jack Wiles; Anthony Reyes

    Elsevier Science 2011; US$ 59.95

    Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible.... more...

  • Botnet Detectionby Wenke Lee; Cliff Wang; David Dagon

    Springer 2007; US$ 169.00

    Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is... more...

  • Role-Based Access Controlby David F. Ferraiolo

    Artech House 2007; US$ 89.00

    Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very... more...

  • Implementing Email and Security Tokensby Sean Turner; Russ Housley

    Wiley 2008; US$ 55.00

    It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for... more...

  • Oracle Identity Managementby Marlin B. Pohlman

    CRC Press 2008; US$ 89.95

    Fundamental Concepts Enterprise Risk What is Risk Management? What is Risk Analysis? Risk Analysis Standards Common Vulnerabilities Maintaining the Knowledge Pool, Plans, and the Management Process Canadian Standard 1797 (CSA-Q850?97) Summary Compliance Frameworks Compliance Framework Taxonomy COBIT ISO... more...

  • Hardware-based Computer Security Techniques to Defeat Hackersby Roger R. Dube

    Wiley 2008; US$ 124.00

    Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed... more...

  • Quality Of Protectionby Dieter Gollmann; Fabio Massacci; Artsiom Yautsiukhin

    Springer 2008; US$ 259.00

    Discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. This work is also suitable for advanced-level students in computer science. more...

  • Synchronizing Internet Protocol Security (SIPSec)by Charles A. Shoniregun

    Springer 2007; US$ 169.00

    Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This volume... more...