The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Springer-Verlag New York Inc 2007; US$ 169.00
Dealing with security informatics, this book discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. It introduces techniques for applications in the area of retail, finance, and bioinformatics. It is useful for upper undergraduate and graduate-level students in computer science. more...
- World Scientific Publishing Company 2005; US$ 128.00
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and... more...
- Elsevier Science 2002; US$ 59.95
Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking... more...
- Elsevier Science 2003; US$ 61.95
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security... more...
- Springer 2006; US$ 149.00
Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more. more...
- McGraw-Hill Education 2006; US$ 55.00
The stories about phishing attacks against banks are so true-to-life, it?s chilling.? --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker?s Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network... more...
- Wiley 2008; US$ 50.00
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers,... more...
- Springer 2006; US$ 24.49
The definitive "counterintelligence" guide to performing preventative security measures for the Windows OS, this second edition covers the release of Windows XP Service Pack 2 and its new security features, including the Windows Firewall and the Security Center. More than 100 pages of new material have been added since the first edition. more...
- Pearson Education 2007; US$ 27.99
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. ?The clarity of David?s argument and the strength of his conviction are truly inspiring. If you don?t believe the world of software affects the world in which you live, you owe it to yourself to read this book.?... more...
- Elsevier Science 2004; US$ 70.95
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks... more...