The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • The Art of Deceptionby Kevin D. Mitnick; William L. Simon; Steve Wozniak

    Wiley 2011; US$ 16.95

    The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned... more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities... more...

  • Benchmarking Security and Trust in Europe and the USby Leon Cremonini; Lorenzo Valeri

    RAND Corporation 2003; US$ 9.95

    This report presents the results of two pilot surveys (for citizens and for businesses) held in 2002, which addressed respondents from the European Union, Switzerland and the United States on a number of topics, among others ?Security and Trust?. It explores how Europeans and Americans experience on-line threats and vulnerabilities. more...

  • Information Securityby Mark Stamp

    Wiley 2005; US$ 104.95

    Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping... more...

  • Configuring SonicWALL Firewallsby Dan Bendell

    Elsevier Science 2006; US$ 51.95

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...

  • The Security Risk Assessment Handbookby Douglas J. Landoll

    CRC Press 2005; US$ 89.95

    Learn the tips, tricks and techniques of the professionals in a detailed study of risk assessment management. Containing sample outlines, checklists and reports, this is unique in its flexibility as a field manual or as an excellent set of procedures. more...

  • Computer Security and Cryptographyby Alan G. Konheim

    Wiley 2007; US$ 145.00

    Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital... more...

  • WarDrivingby Chris Hurley

    Elsevier Science 2004; US$ 51.95

    The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry.... more...

  • Hacker's Challengeby Mike Schiffman

    McGraw-Hill Education 2002; US$ 32.95

    Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants. more...

  • Security in E-Learningby Edgar R. Weippl

    Springer-Verlag New York Inc 2006; US$ 169.00

    As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. 'Security for E-Learning' discusses typical threats to e-learning projects and will introduce how these issues have been and should be addressed. more...