The Leading eBooks Store Online

3,693,353 members ⚫ 1,195,028 ebooks

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Ajax Securityby Billy Hoffman; Bryan Sullivan

    Pearson Education 2007; US$ 43.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities   More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly... more...

  • Windows Lockdown!by Andy Edward Walker

    Pearson Education 2008; US$ 19.99

     Today, if you own a Windows computer you need to understand the risks and the potential damage security threats pose. The mere act of turning on an Internet-connected computer can put you, your family, and even your personal finances at risk! This book defines all the threats an average household might face and provides strategies to turn novice... more...

  • The IT Regulatory and Standards Compliance Handbookby Craig S. Wright

    Elsevier Science 2008; US$ 72.95

    This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger... more...

  • SAP Security Configuration and Deploymentby Joey Hirao

    Elsevier Science 2008; US$ 72.95

    Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With... more...

  • Chained Exploitsby Andrew Whitaker; Keatron Evans; Jack Voth

    Pearson Education 2009; US$ 43.99

    The complete guide to today?s hard-to-defend chained attacks: performing them and preventing them   Nowadays, it?s rare for malicious hackers to rely on just one exploit or tool; instead, they use ?chained? exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to... more...

  • Unauthorised Accessby Wil Allsopp

    Wiley 2010; US$ 45.00 US$ 31.50

    The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures,... more...

  • ISO27001 in a Windows ® Environmentby Brian Honan

    IT Governance Ltd 2010; US$ 66.00

    Gives a detailed breakdown of the controls needed for ISO27001, and discusses the Microsoft products that can be used to implement them. more...

  • The Tao of Network Security Monitoringby Richard Bejtlich

    Pearson Education 2004; US$ 59.99

    "The book you are about to read will arm you with the knowledge you need to defend your network from attackers?both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP... more...

  • Hacking Exposed Web Applications, Third Editionby Joel Scambray; Vincent Liu; Caleb Sima

    McGraw-Hill Education 2010; US$ 53.00 US$ 43.46

    The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration... more...

  • Trustworthy Computing and Servicesby Yuyu Yuan; Xu Wu; Yueming Lu

    Springer Berlin Heidelberg 2014; US$ 70.76

    This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability... more...