The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Artech House 2004; US$ 139.00
This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...
- Wiley 2005; US$ 39.99
A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The... more...
- Pearson Education 2002; US$ 59.99
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography,... more...
- World Scientific Publishing Company 2004; US$ 251.00
Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected... more...
- Elsevier Science 2005; US$ 53.95
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans,... more...
- Wiley 2005; US$ 69.99
CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC)¯2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the... more...
- Taylor & Francis 2001; US$ 74.95
Information Security Risk Analysis will allow any organization to implement risk management techniques that will prove to be cost effective. Using the PARA (Practical Application of Risk Analysis) process the book examines the qualitative risk analysis process and then provides tested variations on the methodology. The PARA process can be used by information... more...
- Kogan Page 2005; US$ 35.00
In the information economy, data has huge value ? to individuals, businesses and villains alike. All organizations are threatened and vulnerable. A Business Guide to Information Security explains to directors and managers the vital issues ? from adware, hackers and phishing to spyware, viruses and zombies ? facing organizations of every type and size,... more...
- Elsevier Science 2006; US$ 64.95
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on... more...
- Elsevier Science 2005; US$ 41.95
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies... more...