The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Proceedings of the International Conference on IT Convergence and Security 2011by Kuinam J. Kim; Seong Jin Ahn

    Springer 2011; US$ 159.00

    As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information... more...

  • Soft Errorsby Jean-Luc Autran; Daniela Munteanu

    CRC Press 2015; US$ 159.95

    " Soft Errors: From Particles to Circuits covers all aspects of the design, use, application, performance, and testing of parts, devices, and systems and addresses every perspective from an engineering, scientific, or physical point of view. ? Many good texts have been written on similar subjects, but none as thorough, as clear, and as complete as... more...

  • Hack Attacks Revealedby John Chirillo

    Wiley 2002; US$ 59.99

    The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into... more...

  • Hack Attacks Deniedby John Chirillo

    Wiley 2001; US$ 54.99

    Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability... more...

  • Computer Security Handbookby Seymour Bosworth; M. E. Kabay

    Wiley 2002; US$ 115.00

    This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security. Chapters are contributed by recognized experts in the industry. This title has come to be known as "Big Blue" in industry circles and has a reputation for being the reference for computer security... more...

  • Mission-Critical Security Plannerby Eric Greenberg

    Wiley 2003; US$ 55.00

    Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques... more...

  • Network Security Bibleby Eric Cole; Ronald L. Krutz; James Conley

    Wiley 2005; US$ 39.99

    A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The... more...

  • Black Hat Physical Device Securityby Drew Miller

    Elsevier Science 2005; US$ 53.95

    Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans,... more...

  • CISSP Training Guideby Roberta Bragg

    Pearson Education 2002; US$ 59.99

    The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography,... more...

  • Security+ Certification Exam Cram 2 (Exam Cram SYO-101)by Kirk Hausman; Diane Barrett; Martin Weiss; Ed Tittel

    Pearson Education 2003; US$ 31.99

    A new edition of this title is available, ISBN-10: 078973804X ISBN-13: 9780789738042   The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a need to better train, staff, and empower those tasked with designing and implementing information... more...