The Leading eBooks Store Online

3,629,807 members ⚫ 1,172,494 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Intelligent Watermarking Techniquesby Jeng-Shyang Pan; Hsiang-Cheh Huang; Lakhmi C. Jain

    World Scientific Publishing Company 2004; US$ 180.00

    Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected... more...

  • Role-Based Access Controlby David Ferraiolo; Richard Kuhn; Ramaswamy Chandramouli

    Artech House 2003; US$ 90.00

    Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer... more...

  • User's Guide tp Crytography and Standards by Alex Dent; Chris Mitchell

    Artech House 2004; US$ 116.00

    With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized... more...

  • Privacy Protection and Computer Forensicsby Michael Caloyannides

    Artech House 2004; US$ 94.00

    This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2005; US$ 69.99 US$ 48.99

    CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the field... more...

  • Information Security Risk Analysis, Second Editionby Thomas R. Peltier

    CRC Press 2005; US$ 87.95

    The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently. Information Security Risk Analysis, Second Edition... more...

  • Software Piracy Exposedby Ron Honick

    Elsevier Science 2005; US$ 41.95

    This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies... more...

  • Business Guide To Information Securityby Alan Calder

    Kogan Page 2005; US$ 35.00

    In the information economy, data has huge value ? to individuals, businesses and villains alike. All organizations are threatened and vulnerable. A Business Guide to Information Security explains to directors and managers the vital issues ? from adware, hackers and phishing to spyware, viruses and zombies ? facing organizations of every type and size,... more...

  • Hackingby Jon Erickson

    No Starch Press 2003; US$ 25.95

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as ?hacking,? Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people?s... more...

  • Codesby Richard A. Mollin

    CRC Press 2005; US$ 109.95

    From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining... more...