The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Pearson Education 2004; US$ 39.99
Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel... more...
- World Scientific Publishing Company 2005; US$ 128.00
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and... more...
- Springer-Verlag New York Inc 2006; US$ 149.00
Introduces a security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. This book discusses a suite of protocols for providing hop integrity in the Internet. Each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation. more...
- Springer 2006; US$ 149.00
Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities... more...
- Springer 2006; US$ 149.00
Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more. more...
- Springer-Verlag Berlin and Heidelberg GmbH & Co. KG 2005; US$ 109.00
The extension UMLsec of the Unified Modeling Language for secure systems development is presented in this text. The first part is accessible to anyone with a basic background on object-oriented systems. The second part covers the mathematical tools needed to use the UMLsec approach to verify UML specifications against security requirements. more...
- Springer-Verlag New York Inc 2007; US$ 169.00
Dealing with security informatics, this book discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. It introduces techniques for applications in the area of retail, finance, and bioinformatics. It is useful for upper undergraduate and graduate-level students in computer science. more...
- Wiley 2007; US$ 49.99
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing... more...
- Taylor and Francis 2001; US$ 104.95
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can... more...
- Wiley 2008; US$ 50.00
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers,... more...