The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Brute Forceby Matt Curtin

    Springer 2007; US$ 25.00

    In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... more...

  • The IT Regulatory and Standards Compliance Handbookby Craig S. Wright

    Elsevier Science 2008; US$ 72.95

    This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger... more...

  • SAP Security Configuration and Deploymentby Joey Hirao

    Elsevier Science 2008; US$ 72.95

    Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With... more...

  • Hacking Exposed, Sixth Editionby Stuart McClure; Joel Scambray; George Kurtz

    McGraw-Hill Education 2009; US$ 49.99

    The tenth anniversary edition of the world's bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities.... more...

  • Mastering Wireless Penetration Testing for Highly Secured Environmentsby Aaron Johns

    Packt Publishing 2015; US$ 26.99

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking. more...

  • The Art of Intrusionby Kevin D. Mitnick; William L. Simon

    Wiley 2009; US$ 16.95

    Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented... more...

  • Cyber Warfare: A Reference Handbookby Paul Springer

    ABC-CLIO 2015; US$ 58.00

    This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. more...

  • Modeling, Evaluating, and Predicting IT Human Resources Performanceby Konstantina Richter; Reiner R. Dumke

    CRC Press 2015; US$ 119.95

    Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology (IT) personnel. However, most methods neglect to account for the rigorous application and evaluation of human errors and their associated risks. This book fills that need. Modeling, Evaluating, and Predicting IT Human... more...

  • The Art of Deceptionby Kevin D. Mitnick; William L. Simon; Steve Wozniak

    Wiley 2011; US$ 16.95

    The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and documentaries. Since hisrelease from federal prison, in 1998, Mitnick has turned... more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities... more...