The Leading eBooks Store Online
3,508,729 members ⚫ 2,065,349 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- IOS Press 2005; US$ 144.00
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations... more...
- Wiley 2015; US$ 29.99
Launch Your Career in Computer Forensics?Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data Capturing... more...
- Pearson Education 2006; US$ 14.99
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft ® Windows 2003 and Microsoft ® Windows XP have drastically simplified the support of encryption technologies in Windows environments.... more...
- Kogan Page 2006; US$ 95.00
The Web is an exciting, but unstable place to do business. This book is designed as a practical guide for managers in developing and implementing appropriate strategies for online risk management. The contributions draw on a range of expertise and know-how, both in IT and in other disciplines, such as the law, insurance, accounting and consulting. more...
- No Starch Press 2003; US$ 25.95
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as ?hacking,? Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people?s... more...
- McGraw-Hill Education 2005; US$ 49.99
?The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.? --Bill Machrone, PC Magazine "The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine "For almost any computer book, you can find a clone. But not this one... A one-of-a-kind... more...
- IOS Press 2006; US$ 183.00
Today?s society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the health care system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates... more...
- Elsevier Science 2006; US$ 64.95
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop... more...
- Wiley 2007; US$ 24.99
Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from... more...
- Emerald Group Publishing Limited 2006; US$ 199.00
This e-book showcases papers from the 2006 International Workshop on Security in Information Systems. Those selected for publication provide international perspectives on a number of security problems and concerns. Themes explored include online cyber attacks, secure interorganizational workflows, electronic voting systems, and security patterns and... more...