The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Pearson Education 2006; US$ 48.00
Cisco Network Admission Control Volume II: NAC Framework Deployment and Troubleshooting The self-defending network in action Jazib Frahim, CCIEŽ No. 5459 Omar Santos David White, Jr., CCIE No. 12,021 When most information security professionals think about threats to their networks, they think about the threat of attackers... more...
- Wiley 2006; US$ 118.00
MARKUS JAKOBSSON , PhD, is Associate Professor in the School of Informatics at Indiana University, where he is also Associate Director of the Center for Applied Cybersecurity Research. Dr. Jakobsson is the former editor of RSA CryptoBytes . He is a noted authority on the subject of phishing and is regularly invited to speak on the topic at conferences... more...
- Emerald Group Publishing Limited 2004; US$ 199.00
We have not seen an Internet-based game that can be identified with the arrival of Internet gaming for the masses. Due to the foundational structure of the Internet, there probably will not be one anytime soon. The problem is that the underlying Internet protocol, IPv4, has not had a major update since its introduction in the early 1970s. Fortunately,... more...
- Wiley 2007; US$ 119.00
David Little is Data Protection specialist for VERITAS Software. He has worked in the IT industry for 37 years, nine of which were spent working with data protection applications. David is co-author of Implementing Backup and Recovery: The Readiness Guide for the Enterprise. Skip Farmer is Senior Staff Systems Engineer and... more...
- McGraw-Hill Education 2005; US$ 49.99
?The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.? --Bill Machrone, PC Magazine "The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine "For almost any computer book, you can find a clone. But not this one... A one-of-a-kind... more...
- Emerald Group Publishing Limited 2006; US$ 199.00
This e-book showcases papers from the 2006 International Workshop on Security in Information Systems. Those selected for publication provide international perspectives on a number of security problems and concerns. Themes explored include online cyber attacks, secure interorganizational workflows, electronic voting systems, and security patterns and... more...
- Pearson Education 2007; US$ 51.99
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks... more...
- Elsevier Science 2002; US$ 59.95
Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking... more...
- Elsevier Science 2003; US$ 61.95
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security... more...
- CRC Press 2007; US$ 243.00
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the... more...