The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Information Securityby Mark Stamp

    Wiley 2005; US$ 104.95

    Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping... more...

  • Configuring SonicWALL Firewallsby Dan Bendell

    Elsevier Science 2006; US$ 51.95

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...

  • How to Cheat at Managing Information Securityby Mark Osborne

    Elsevier Science 2006; US$ 41.95

    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all... more...

  • Information Securityby Timothy P. Layton

    CRC Press 2006; US$ 121.95

    EVALUATING AND MEASURING AN INFORMATION SECURITY PROGRAM INFORMATION SECURITY RISK ASSESSMENT MODEL (ISRAM?) . Background . Linkage . Risk Assessment Types . Relationship to Other Models and Standards . Terminology . Risk Assessment Relationship . Information Security Risk Assessment Model (ISRAM) . References GLOBAL INFORMATION SECURITY... more...

  • Computer Security and Cryptographyby Alan G. Konheim

    Wiley 2007; US$ 150.00

    ALAN G. KONHEIM , PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models. more...

  • WarDrivingby Chris Hurley

    Elsevier Science 2004; US$ 51.95

    The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry.... more...

  • Security in E-Learningby Edgar R. Weippl

    Springer-Verlag New York Inc 2006; US$ 169.00

    As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. 'Security for E-Learning' discusses typical threats to e-learning projects and will introduce how these issues have been and should be addressed. more...

  • Hacking Exposedby Joel Scambray; Stuart McClure; George Kurtz

    McGraw-Hill Education 2000; US$ 39.99

    Casing the Establishment. Footprinting. Scanning. Enumeration. System Hacking. Hacking the Consumer: Win9x, Web Browsers, E-mail Clients, & Broadband Internet Access. Hacking Windows NT. Hacking Windows 2000. Novell Netware Hacking. UNIX. Network Hacking. Dial-Up & VPN Hacking. Network Devices. Firewalls. Denial of Service (DoS) Attacks.... more...

  • Ajax Securityby Billy Hoffman; Bryan Sullivan

    Pearson Education 2007; US$ 43.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities   More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly... more...

  • PCI Complianceby Branden R. Williams; Anton Chuvakin; Tony Bradley

    Elsevier Science 2011; US$ 64.95

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry... more...