The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Pearson Education 2006; US$ 14.99
With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows, recent advances in Microsoft ® Windows 2003 and Microsoft ® Windows XP have drastically simplified the support of encryption technologies in Windows environments.... more...
- IOS Press 2006; US$ 183.00
Today?s society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the health care system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates... more...
- Wiley 2006; US$ 114.00
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate... more...
- Pearson Education 2006; US$ 48.00
Cisco Network Admission Control Volume II: NAC Framework Deployment and Troubleshooting The self-defending network in action Jazib Frahim, CCIE® No. 5459 Omar Santos David White, Jr., CCIE No. 12,021 When most information security professionals think about threats to their networks, they think about the threat of attackers... more...
- Emerald Group Publishing Limited 2006; US$ 199.00
This e-book showcases papers from the 2006 International Workshop on Security in Information Systems. Those selected for publication provide international perspectives on a number of security problems and concerns. Themes explored include online cyber attacks, secure interorganizational workflows, electronic voting systems, and security patterns and... more...
- Emerald Group Publishing Limited 2004; US$ 199.00
We have not seen an Internet-based game that can be identified with the arrival of Internet gaming for the masses. Due to the foundational structure of the Internet, there probably will not be one anytime soon. The problem is that the underlying Internet protocol, IPv4, has not had a major update since its introduction in the early 1970s. Fortunately,... more...
- Wiley 2007; US$ 24.99
Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from people... more...
- Wiley 2007; US$ 115.00
How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability,... more...
- McGraw-Hill Education 2005; US$ 49.99
?The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure.? --Bill Machrone, PC Magazine "The definitive compendium of intruder practices and tools." --Steve Steinke, Network Magazine "For almost any computer book, you can find a clone. But not this one... A one-of-a-kind... more...
- World Scientific Publishing Company 2005; US$ 128.00
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and... more...