The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Security Metricsby Andrew Jaquith

    Pearson Education 2007; US$ 47.99

    The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.   Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert... more...

  • Access Control Systemsby Messaoud Benantar

    Springer-Verlag New York Inc 2006; US$ 129.00

    Details access control mechanisms. This book provides an introduction to the foundations of programming systems security as well as the theory behind access control models. It explores various models employed and describes how they work. It is useful for security software developers. more...

  • Hacking Exposedby Joel Scambray; Stuart McClure; George Kurtz

    McGraw-Hill Education 2000; US$ 39.99

    The best way to protect a system is to understand all the ways hackers can break into it: Hacking Exposed shows administrators how the flaws and loopholes in security technologies can be exploited, and provides security solutions. This edition is updated with new pages to cover the hacks you've been reading about--DoS attacks, Linux hacks, e-mail... more...

  • Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutionsby Rich Cannings; Himanshu Dwivedi; Zane Lackey

    McGraw-Hill Education 2007; US$ 49.99

    Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest... more...

  • Brute Forceby Matt Curtin

    Springer 2007; US$ 25.00

    In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... more...

  • The IT Regulatory and Standards Compliance Handbookby Craig S. Wright

    Elsevier Science 2008; US$ 72.95

    This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger... more...

  • SAP Security Configuration and Deploymentby Joey Hirao

    Elsevier Science 2008; US$ 72.95

    Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With... more...

  • Hacking Exposed, Sixth Editionby Stuart McClure; Joel Scambray; George Kurtz

    McGraw-Hill Education 2009; US$ 49.99

    The world's bestselling computer security book--fully expanded and updated "Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the... more...

  • Computer Forensics with FTKby Fernando Carbone

    Packt Publishing 2014; US$ 13.99

    This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated... more...

  • Bruce Schneier on Trust Setby Bruce Schneier

    Wiley 2014; US$ 40.00

    Save almost 25% on this two-book set from Bruce Schneier covering issues of social trust and security This set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security . In Liars and Outliers , Schneier covers the topic of... more...