The Leading eBooks Store Online
3,840,610 members ⚫ 1,266,180 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Artech House 2004; US$ 94.00
This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...
- Wiley 2005; US$ 69.99 US$ 61.50
CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC)¯2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the... more...
- Elsevier Science 2005; US$ 41.95
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies... more...
- Elsevier Science 2006; US$ 31.95
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful. IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage... more...
- CRC Press 2005; US$ 87.95
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently. Information Security Risk Analysis, Second Edition... more...
- CRC Press 2005; US$ 109.95
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining... more...
- Wiley 2015; US$ 29.99 US$ 26.50
Launch Your Career in Computer Forensics?Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data Capturing... more...
- IOS Press 2005; US$ 144.00
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations... more...
- No Starch Press 2003; US$ 25.95
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as ?hacking,? Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people?s... more...
- Pearson Education 2006; US$ 14.99
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft ® Windows 2003 and Microsoft ® Windows XP have drastically simplified the support of encryption technologies in Windows environments.... more...