The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • User's Guide tp Crytography and Standards by Alex Dent; Chris Mitchell

    Artech House 2004; US$ 116.00

    With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized... more...

  • Privacy Protection and Computer Forensicsby Michael Caloyannides

    Artech House 2004; US$ 94.00

    This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...

  • Intelligent Watermarking Techniquesby Jeng-Shyang Pan; Hsiang-Cheh Huang; Lakhmi C. Jain

    World Scientific Publishing Company 2004; US$ 251.00

    Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2005; US$ 69.99

    CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC)¯2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the... more...

  • Software Piracy Exposedby Ron Honick

    Elsevier Science 2005; US$ 41.95

    This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies... more...

  • Business Guide To Information Securityby Alan Calder

    Kogan Page 2005; US$ 35.00

    In the information economy, data has huge value ? to individuals, businesses and villains alike. All organizations are threatened and vulnerable. A Business Guide to Information Security explains to directors and managers the vital issues ? from adware, hackers and phishing to spyware, viruses and zombies ? facing organizations of every type and size,... more...

  • Syngress IT Security Project Management Handbookby Susan Snedaker

    Elsevier Science 2006; US$ 64.95

    The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on... more...

  • Codesby Richard A. Mollin

    CRC Press 2005; US$ 109.95

    ?an encyclopedic work of a very high standard. ? More than merely a book that describes cryptographic codes, scattered throughout this book are pictures and biographies of key personnel responsible for progressing the world?s knowledge and use of codes, as well as exercises and problems ? This is, without question, an excellent book. ? the depth of... more...

  • Information Security Risk Analysis, Second Editionby Thomas R. Peltier

    CRC Press 2005; US$ 87.95

    INTRODUCTION Frequently asked questions Conclusion RISK MANAGEMENT Overview Risk Management as Part of the Business Process Employee Roles and Responsibilities Information Security Life Cycle Risk Analysis Process Risk Assessment Cost-Benefit Analysis Risk Mitigation Final Thoughts RISK ASSESSMENT PROCESS Introduction Risk Assessment Process Information... more...

  • Applied Public Key Infrastructureby J. Zhou; M.-C. Kang; F. Bao

    IOS Press 2005; US$ 144.00

    Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations... more...