The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • The Business Case for Network Securityby Catherine Paquet; Warren Saxe

    Pearson Education 2004; US$ 39.99

    Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel... more...

  • Digital Data Integrityby David B Little; Skip Farmer; Oussama El-Hilali

    Wiley 2007; US$ 119.00

    David Little is Data Protection specialist for VERITAS Software.  He has worked in the IT industry for 37 years, nine of which were spent working with data protection applications.   David is co-author of Implementing Backup and Recovery: The Readiness Guide for the Enterprise. Skip Farmer is Senior Staff Systems Engineer and... more...

  • Checkpoint Next Generation Security Administrationby Syngress

    Elsevier Science 2002; US$ 59.95

    Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking... more...

  • CheckPoint NG VPN 1/Firewall 1by Syngress

    Elsevier Science 2003; US$ 61.95

    Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security... more...

  • Basics Of Contemporary Cryptography For It Practitionersby Boris Ryabko; Andrey Fionov

    World Scientific Publishing Company 2005; US$ 128.00

    The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and... more...

  • Building an Information Security Awareness Programby Mark B. Desman

    CRC Press 2001; US$ 109.95

    GETTING STARTED Reviewing the Provisions the Company Now Has in Place Learning the Players-Where the Power Resides Learning the Corporate Culture-What Can Work Here, What Cannot Obtaining Management Buyoff-How to Present the Case Finding Communications Vehicles Currently in Place ESTABLISHING A BASELINE Review All Company Polices, Procedures, Standards,... more...

  • Professional Rootkitsby Ric Vieler

    Wiley 2007; US$ 49.99

    Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing... more...

  • Applied Cryptanalysisby Mark Stamp; Richard M. Low

    Wiley 2007; US$ 124.00

    Mark Stamp , PhD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice. Richard M. Low , PhD, is Lecturer in the... more...

  • Hacker's Challenge 3by David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi

    McGraw-Hill Education 2010; US$ 55.00

    The stories about phishing attacks against banks are so true-to-life, it?s chilling.? --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker?s Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network... more...

  • Theory of Cryptographyby Salil P. Vadhan

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG 2007; US$ 99.00

    This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers presented were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on encryption, universally composable security, arguments... more...