The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • A part-themed issue on internet securityby Dr Mariemma Yague; Dr Eduardo Fernandez-Medina

    Emerald Group Publishing Limited 2006; US$ 199.00

    This e-book showcases papers from the 2006 International Workshop on Security in Information Systems. Those selected for publication provide international perspectives on a number of security problems and concerns. Themes explored include online cyber attacks, secure interorganizational workflows, electronic voting systems, and security patterns and... more...

  • Cisco Network Admission Control, Volume IIby Jazib Frahim; Omar Santos; Jr. David W. White

    Pearson Education 2006; US$ 48.00

    Cisco Network Admission Control Volume II: NAC Framework Deployment and Troubleshooting   The self-defending network in action   Jazib Frahim, CCIEŽ No. 5459 Omar Santos David White, Jr., CCIE No. 12,021   When most information security professionals think about threats to their networks, they think about the threat of attackers... more...

  • Network and security issuesby Dr. David Raitt

    Emerald Group Publishing Limited 2004; US$ 199.00

    We have not seen an Internet-based game that can be identified with the arrival of Internet gaming for the masses. Due to the foundational structure of the Internet, there probably will not be one anytime soon. The problem is that the underlying Internet protocol, IPv4, has not had a major update since its introduction in the early 1970s. Fortunately,... more...

  • Endpoint Securityby Mark Kadrich

    Pearson Education 2007; US$ 51.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. A Comprehensive, Proven Approach to Securing All Your Network Endpoints!   Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks... more...

  • Information Security Management Handbook, Sixth Editionby Harold F. Tipton; Micki Krause

    Taylor and Francis 2007; US$ 231.00

    Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the... more...

  • Digital Data Integrityby David B Little; Skip Farmer; Oussama El-Hilali

    Wiley 2007; US$ 115.00

    How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability,... more...

  • The Business Case for Network Securityby Catherine Paquet; Warren Saxe

    Pearson Education 2004; US$ 39.99

    Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel... more...

  • Hop Integrity in the Internetby Chin-Tser Huang; Mohamed G. Gouda

    Springer-Verlag New York Inc 2006; US$ 149.00

    Introduces a security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. This book discusses a suite of protocols for providing hop integrity in the Internet. Each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation. more...

  • Security Planning and Disaster Recoveryby Eric Maiwald; William Sieglein

    McGraw-Hill Education 2002; US$ 43.95

    Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions. more...

  • Cyberspace Security and Defenseby Janusz S. Kowalik; Janusz Gorski; Anatoly Sachenko

    Springer 2006; US$ 149.00

    Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities... more...