The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • SAP Security Configuration and Deploymentby Joey Hirao

    Elsevier Science 2008; US$ 72.95

    Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With... more...

  • Mastering Wireless Penetration Testing for Highly Secured Environmentsby Aaron Johns

    Packt Publishing 2015; US$ 26.99

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking. more...

  • Cyber Warfare: A Reference Handbookby Paul Springer

    ABC-CLIO 2015; US$ 58.00

    This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. more...

  • Modeling, Evaluating, and Predicting IT Human Resources Performanceby Konstantina Richter; Reiner R. Dumke

    CRC Press 2015; US$ 119.95

    Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology (IT) personnel. However, most methods neglect to account for the rigorous application and evaluation of human errors and their associated risks. This book fills that need. Modeling, Evaluating, and Predicting IT Human... more...

  • The Art of Intrusionby Kevin D. Mitnick; William L. Simon

    Wiley 2009; US$ 16.95

    Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented... more...

  • Hacking Exposed, Sixth Editionby Stuart McClure; Joel Scambray; George Kurtz

    McGraw-Hill Education 2009; US$ 49.99

    Stuart McClure, CISSP, CNE, CCSE, was founder, president, and CTO of Foundstone, and ran the worldwide AVERT team at McAfee. Joel Scambray, CISSP, is chief strategy officer for Leviathan Security Group and was a senior director at Microsoft Corporation focusing on security. George Kurtz, CISSP, former CEO of Foundstone, is senior vice... more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities... more...

  • Benchmarking Security and Trust in Europe and the USby Leon Cremonini; Lorenzo Valeri

    RAND Corporation 2003; US$ 9.95

    This report presents the results of two pilot surveys (for citizens and for businesses) held in 2002, which addressed respondents from the European Union, Switzerland and the United States on a number of topics, among others ?Security and Trust?. It explores how Europeans and Americans experience on-line threats and vulnerabilities. more...

  • Configuring SonicWALL Firewallsby Dan Bendell

    Elsevier Science 2006; US$ 51.95

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...

  • How to Cheat at Managing Information Securityby Mark Osborne

    Elsevier Science 2006; US$ 41.95

    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all... more...