The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Security Planning and Disaster Recoveryby Eric Maiwald; William Sieglein

    McGraw-Hill Education 2002; US$ 43.95

    Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions. more...

  • Hacker's Challenge 3by David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi

    McGraw-Hill Education 2010; US$ 58.00

    The stories about phishing attacks against banks are so true-to-life, it?s chilling.? --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker?s Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network... more...

  • Building an Information Security Awareness Programby Mark B. Desman

    CRC Press 2001; US$ 109.95

    In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can... more...

  • The Shellcoder's Handbookby Chris Anley; John Heasman; Felix Lindner; Gerardo Richarte

    Wiley 2011; US$ 49.99

    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable"... more...

  • Cryptology Unlockedby Reinhard Wobst; Angelika Shafir

    Wiley 2007; US$ 50.00

    Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...

  • Geekonomicsby David Rice

    Pearson Education 2007; US$ 27.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. ?The clarity of David?s argument and the strength of his conviction are truly inspiring. If you don?t believe the world of software affects the world in which you live, you owe it to yourself to read this book.?... more...

  • Implementing Homeland Security for Enterprise ITby Michael Erbschloe

    Elsevier Science 2004; US$ 70.95

    This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks... more...

  • Essential Computer Securityby T. Bradley

    Elsevier Science 2006; US$ 31.95

    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a... more...

  • CISO Leadershipby Todd Fitzgerald; Micki Krause

    CRC Press 2007; US$ 92.95

    Caught in the crosshairs of ?Leadership? and ?Information Technology?, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication,... more...

  • PCI Complianceby Branden R. Williams; Anton Chuvakin; Tony Bradley

    Elsevier Science 2011; US$ 64.95

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry... more...