The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Proceedings of the International Conference on IT Convergence and Security 2011by Kuinam J. Kim; Seong Jin Ahn

    Springer 2011; US$ 159.00

    As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information... more...

  • Unauthorised Accessby Wil Allsopp

    Wiley 2010; US$ 45.00

    The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures,... more...

  • How to Cheat at Managing Information Securityby Mark Osborne

    Elsevier Science 2006; US$ 41.95

    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all... more...

  • The News Machineby James Hanning; Glenn Mulcaire

    Gibson Square 2014; US$ 5.82

    There is one mystery figure at the heart of ‘Hackergate? – Glenn Mulcaire, the News of the World?s top private investigator. The former AFC Wimbledon footballer has never spoken publicly or in court about his work investigating and backing up front-page news stories (such as the News of the World?s award-winning David Beckham scoop). Mulcaire?s... more...

  • ISO27001 in a Windows ® Environmentby Brian Honan

    IT Governance Ltd 2010; US$ 66.00

    Gives a detailed breakdown of the controls needed for ISO27001, and discusses the Microsoft products that can be used to implement them. more...

  • Hacking Exposed Web Applications, Third Editionby Joel Scambray; Vincent Liu; Caleb Sima

    McGraw-Hill Education 2010; US$ 50.00

    The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new... more...

  • Wi-Fi Securityby Stewart Miller

    McGraw-Hill Education 2003; US$ 54.95

    Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs. more...

  • Pervasive Wireless Environments: Detecting and Localizing User Spoofingby Jie Yang; Yingying Chen; Wade Trappe; Jerry Cheng

    Springer 2014; US$ 54.99

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors... more...

  • Hack Attacks Revealedby John Chirillo

    Wiley 2002; US$ 59.99

    The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into... more...

  • Hack Attacks Deniedby John Chirillo

    Wiley 2001; US$ 54.99

    Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability... more...