The Leading eBooks Store Online

3,661,113 members ⚫ 1,174,592 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Secure Online Business Handbookby Jonathan Reuvid

    Kogan Page 2006; US$ 95.00

    The Web is an exciting, but unstable place to do business. This book is designed as a practical guide for managers in developing and implementing appropriate strategies for online risk management. The contributions draw on a range of expertise and know-how, both in IT and in other disciplines, such as the law, insurance, accounting and consulting. more...

  • Hackingby Jon Erickson

    No Starch Press 2003; US$ 25.95

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as ?hacking,? Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people?s... more...

  • Network Security Assessmentby Steve Manzuik; Ken Pfeil; Andrew Gold

    Elsevier Science 2006; US$ 64.95

    This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop... more...

  • Simple Computer Securityby CA; Eric Geier; Jim Geier

    Wiley 2007; US$ 24.99 US$ 14.99

    Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from... more...

  • Information Assurance and Computer Securityby J.P. Thomas; M. Essaaidi

    IOS Press 2006; US$ 183.00

    Today?s society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the health care system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates... more...

  • Phishing and Countermeasuresby Markus Jakobsson; Steven Myers

    Wiley 2006; US$ 122.00 US$ 105.73

    Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate... more...

  • Information Security Management Handbook, Sixth Editionby Harold F. Tipton; Micki Krause

    CRC Press 2007; US$ 243.00

    Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the... more...

  • Network and security issuesby Dr. David Raitt

    Emerald Group Publishing Limited 2004; US$ 199.00

    We have not seen an Internet-based game that can be identified with the arrival of Internet gaming for the masses. Due to the foundational structure of the Internet, there probably will not be one anytime soon. The problem is that the underlying Internet protocol, IPv4, has not had a major update since its introduction in the early 1970s. Fortunately,... more...

  • Digital Data Integrityby David B Little; Skip Farmer; Oussama El-Hilali

    Wiley 2007; US$ 123.00 US$ 106.60

    How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability,... more...

  • The Business Case for Network Securityby Catherine Paquet; Warren Saxe

    Pearson Education 2004; US$ 39.99

    Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel... more...