The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Fundamentals of Cryptologyby Henk C.A.Van Tilborg

    Springer 1999; US$ 95.00

    This work introduces modern cryptographic methods. After a survey of classical cryptosystems, it conveys three main areas. Firstly, stream ciphers and block ciphers. Secondly, public key cryptosystems, and thirdly zero-knowledge proofs, secret sharing schemes and authentication codes. more...

  • Advances in Information Security Management & Small Systems Security by Jan H.P. Eloff; Les Labuschange; Rossouw von Solms

    Springer 2001; US$ 213.00

    This work is a report on the current status of important research topics in algebraic geometry and its applications, such as computational algebra and geometry, singularity theory algorithms, numerical solutions of polynomial systems, coding theory, communication networks, and computer vision. more...

  • Network Security Bibleby Eric Cole; Ronald L. Krutz; James Conley

    Wiley 2005; US$ 39.99

    A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The... more...

  • CISSP Training Guideby Roberta Bragg

    Pearson Education 2002; US$ 59.99

    The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography,... more...

  • Security+ Certification Exam Cram 2 (Exam Cram SYO-101)by Kirk Hausman; Diane Barrett; Martin Weiss; Ed Tittel

    Pearson Education 2003; US$ 31.99

    A new edition of this title is available, ISBN-10: 078973804X ISBN-13: 9780789738042   The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a need to better train, staff, and empower those tasked with designing and implementing information... more...

  • Role-Based Access Controlby David Ferraiolo; Richard Kuhn; Ramaswamy Chandramouli

    Artech House 2003; US$ 90.00

    Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer... more...

  • User's Guide tp Crytography and Standards by Alex Dent; Chris Mitchell

    Artech House 2004; US$ 116.00

    With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized... more...

  • Privacy Protection and Computer Forensicsby Michael Caloyannides

    Artech House 2004; US$ 94.00

    This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...

  • Intelligent Watermarking Techniquesby Jeng-Shyang Pan; Hsiang-Cheh Huang; Lakhmi C. Jain

    World Scientific Publishing Company 2004; US$ 251.00

    Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected... more...

  • Black Hat Physical Device Securityby Drew Miller

    Elsevier Science 2005; US$ 53.95

    Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans,... more...