The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Digital Data Integrityby David B Little; Skip Farmer; Oussama El-Hilali

    Wiley 2007; US$ 115.00

    How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability,... more...

  • Professional Rootkitsby Ric Vieler

    Wiley 2007; US$ 49.99

    Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing... more...

  • Applied Cryptanalysisby Mark Stamp; Richard M. Low

    Wiley 2007; US$ 120.00

    The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... more...

  • Cyberspace Security and Defenseby Janusz S. Kowalik; Janusz Gorski; Anatoly Sachenko

    Springer 2006; US$ 149.00

    Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities... more...

  • Building an Information Security Awareness Programby Mark B. Desman

    Taylor and Francis 2001; US$ 104.95

    In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can... more...

  • Data Warehousing and Data Mining Techniques for Cyber Securityby Anoop Singhal

    Springer-Verlag New York Inc 2007; US$ 169.00

    Dealing with security informatics, this book discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. It introduces techniques for applications in the area of retail, finance, and bioinformatics. It is useful for upper undergraduate and graduate-level students in computer science. more...

  • Information Assuranceby Andrew Blyth; Gerald L. Kovacich

    Springer 2006; US$ 149.00

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more. more...

  • Secure Systems Development with UMLby Jan Jürjens

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG 2005; US$ 109.00

    The extension UMLsec of the Unified Modeling Language for secure systems development is presented in this text. The first part is accessible to anyone with a basic background on object-oriented systems. The second part covers the mathematical tools needed to use the UMLsec approach to verify UML specifications against security requirements. more...

  • Hop Integrity in the Internetby Chin-Tser Huang; Mohamed G. Gouda

    Springer-Verlag New York Inc 2006; US$ 149.00

    Introduces a security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. This book discusses a suite of protocols for providing hop integrity in the Internet. Each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation. more...

  • Hacker's Challenge 3by David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi

    McGraw-Hill Education 2006; US$ 55.00

    The stories about phishing attacks against banks are so true-to-life, it?s chilling.? --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker?s Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network... more...