The Leading eBooks Store Online

3,943,133 members ⚫ 1,297,993 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Hacker's Challenge 3by David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi

    McGraw-Hill Education 2010; US$ 58.00

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network... more...

  • Building an Information Security Awareness Programby Mark B. Desman

    CRC Press 2001; US$ 109.95

    In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can... more...

  • Security Planning and Disaster Recoveryby Eric Maiwald; William Sieglein

    McGraw-Hill Education 2002; US$ 43.95

    Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions. more...

  • The Shellcoder's Handbookby Chris Anley; John Heasman; Felix Lindner; Gerardo Richarte

    Wiley 2011; US$ 49.99 US$ 43.99

    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable"... more...

  • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Securityby T. Bradley

    Elsevier Science 2006; US$ 31.95

    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a... more...

  • Cryptology Unlockedby Reinhard Wobst; Angelika Shafir

    Wiley 2007; US$ 50.00 US$ 45.00

    Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...

  • CISO Leadershipby Todd Fitzgerald; Micki Krause

    CRC Press 2007; US$ 92.95

    Caught in the crosshairs of “Leadership” and “Information Technology”, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication,... more...

  • Digital Watermarking and Steganographyby Ingemar Cox; Matthew Miller; Jeffrey Bloom; Jessica Fridrich; Ton Kalker

    Elsevier Science 2007; US$ 96.95

    Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties... more...

  • The Best Damn Cybercrime and Digital Forensics Book Periodby Jack Wiles; Anthony Reyes

    Elsevier Science 2011; US$ 59.95

    Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible.... more...

  • The Best Damn IT Security Management Book Periodby Susan Snedaker; Robert McCrie

    Elsevier Science 2011; US$ 62.95

    The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing... more...