The Leading eBooks Store Online
3,693,353 members ⚫ 1,195,028 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Wiley 2011; US$ 49.99 US$ 34.99
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable"... more...
- Wiley 2007; US$ 50.00 US$ 43.33
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...
- CRC Press 2007; US$ 92.95
Caught in the crosshairs of ?Leadership? and ?Information Technology?, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication,... more...
- Elsevier Science 2006; US$ 31.95
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a... more...
- Pearson Education 2007; US$ 27.99
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. ?The clarity of David?s argument and the strength of his conviction are truly inspiring. If you don?t believe the world of software affects the world in which you live, you owe it to yourself to read this book.?... more...
- Elsevier Science 2011; US$ 64.95
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry... more...
- Elsevier Science 2011; US$ 62.95
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing... more...
- Pearson Education 2007; US$ 39.99
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpace is the first insider?s guide... more...
- Elsevier Science 2007; US$ 96.95
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties... more...
- Elsevier Science 2011; US$ 59.95
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible.... more...