The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Cryptology Unlockedby Reinhard Wobst; Angelika Shafir

    Wiley 2007; US$ 50.00

    Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...

  • Cyber Security Essentialsby James Graham; Ryan Olson; Rick Howard

    CRC Press 2010; US$ 69.95

    The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish... more...

  • Cyber Security Policy Guidebookby Jennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus H. Sachs; Jeffrey Schmidt; Joseph Weiss

    Wiley 2012; US$ 95.95

    Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes... more...

  • Cybercrime Case Presentationby Brett Shavers

    Elsevier Science 2013; US$ 19.95

    Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a... more...

  • Das IT-Gesetz: Compliance in der IT-Sicherheitby Ralf T. Grünendahl; Andreas F. Steinbacher; Peter H.L. Will

    Vieweg+Teubner Verlag 2009; US$ 54.99

    Das Buch richtet sich an Führungskräfte und Sicherheitsbeauftragte, die vor der Aufgabe stehen, Regelungen zur IT-Sicherheit für ihr Unternehmen zu definieren. Dieses Buch liefert dazu eine konkrete Anleitung. Es basiert auf internationalen Standards wie BSI Grundschutz-Handbuch, Cobit und ITIL. more...

  • Data Breachesby ITG Research Team

    IT Governance Publishing 2008; US$ 348.00

    Data breaches: Trends, costs and best practices 2008, from IT Governance Publishing, gives you the latest information and worldwide trends in corporate data breaches - those that affect personally identifiable information and contravene laws such as the UK Data Protection Act, HIPAA and so on - and identifies best practice... more...

  • Data Hidingby Michael T. Raggo; Chet Hosmer

    Elsevier Science 2012; US$ 49.95

    As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware... more...

  • Datenbanken - Konzepte und Sprachenby Gunter Saake; Kai-Uwe Sattler; Andreas Heuer

    mitp 2013; US$ 32.17

    Aus dem Inhalt: Kernkonzepte relationaler Datenbanken Architekturen Datenbankentwurfsprozess Entity-Relationship-Modellierung Relationenmodell Erweiterte Konzepte Erweiterte Entwurfsmodelle SQL und weitere Anfragesprachen Sichten, Transaktionen, Integrität und Trigger Datenbankanwendungsentwicklung Zugriffskontrolle & Privacy Weitere... more...

  • Dear Hackerby Emmanuel Goldstein

    Wiley 2010; US$ 29.95

    Actual letters written to the leading hackers' magazine For 25 years, 2600: The Hacker Quarterly has given voice to the hacker community in all its manifestations. This collection of letters to the magazine reveals the thoughts and viewpoints of hackers, both white and black hat, as well as hacker wannabes, technophiles, and people concerned... more...

  • Der IT Security Managerby Heinrich Kersten; Gerhard Klett; Klaus-Dieter Wolfenstetter

    Vieweg+Teubner Verlag 2012; US$ 59.99

    Ein Buch, das den Sicherheitsverantwortlichen (und allen Interessierten) den "roten Faden" liefert, wie man die IT-Sicherheit im Unternehmen angeht, wie man sinnvolle Security Policies und Sicherheitskonzepte schreibt, wie man sukzessive zu einer stetigen Verbesserung der Sicherheit kommt, ist schon eine wesentliche Hilfe für die Praxis. Das hochkarätig... more...