The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Taylor & Francis 2001; US$ 74.95
Information Security Risk Analysis will allow any organization to implement risk management techniques that will prove to be cost effective. Using the PARA (Practical Application of Risk Analysis) process the book examines the qualitative risk analysis process and then provides tested variations on the methodology. The PARA process can be used by information... more...
- Kogan Page 2005; US$ 35.00
In the information economy, data has huge value ? to individuals, businesses and villains alike. All organizations are threatened and vulnerable. A Business Guide to Information Security explains to directors and managers the vital issues ? from adware, hackers and phishing to spyware, viruses and zombies ? facing organizations of every type and size,... more...
- Elsevier Science 2006; US$ 64.95
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on... more...
- Elsevier Science 2005; US$ 41.95
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies... more...
- Taylor and Francis 2004; US$ 146.95
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct... more...
- CRC Press 2000; US$ 84.95
A resource for professionals who want to guard their data and systems without breaking their banks. It details the five key components of information security architecture and outlines the steps necessary to establish an integrated and effective security programme. more...
- CRC Press 2006; US$ 109.95
This handbook can serve as a reference for information security practitioners and as a review to prepare for the Certified Information System Security Professional exam. The handbook maps 10 domains of the information security common body of knowledge, including access control systems and methodology, telecommunications and network security, crypto more...
- Pearson Education 2006; US$ 43.99
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam. Along... more...
- Taylor and Francis 2005; US$ 104.95
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining... more...
- CRC Press 2005; US$ 87.95
Managing an Information Security and Privacy Awareness and Training Program provides a starting point and an all-in-one resource for infosec and privacy education practitioners who are building programs for their organizations. The author applies knowledge obtained through her work in education, creating a comprehensive resource of nearly everything... more...