The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Security Planning and Disaster Recoveryby Eric Maiwald; William Sieglein

    McGraw-Hill Education 2002; US$ 43.95

    Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions. more...

  • The Shellcoder's Handbookby Chris Anley; John Heasman; Felix Lindner; Gerardo Richarte

    Wiley 2011; US$ 49.99

    This much-anticipated revision, written by the ultimate groupof top security experts in the world, features 40 percent newcontent on how to find security holes in any operating system orapplication New material addresses the many new exploitation techniquesthat have been discovered since the first edition, includingattacking "unbreakable" software... more...

  • Cryptology Unlockedby Reinhard Wobst; Angelika Shafir

    Wiley 2007; US$ 50.00

    Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...

  • Implementing Homeland Security for Enterprise ITby Michael Erbschloe

    Elsevier Science 2004; US$ 70.95

    This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks... more...

  • CISO Leadershipby Todd Fitzgerald; Micki Krause

    CRC Press 2007; US$ 89.95

    A LEADERSHIP DISCONNECT What You Told Us: A CISO Survey, T. Fitzgerald A LEADERSHIP MANDATE Who Companies Really Want to HIRE: How to Advance Your Career and Have Great Success, J. Brocaglia The Evolving Information Security Landscape, W.H. Murray Business Drivers for Information Security, H. DeMaio Security as a Business... more...

  • The CEH Prep Guideby Ronald L. Krutz; Russell Dean Vines

    Wiley 2008; US$ 50.00

    The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers,... more...

  • Essential Computer Securityby T. Bradley

    Elsevier Science 2006; US$ 31.95

    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a... more...

  • Geekonomicsby David Rice

    Pearson Education 2007; US$ 27.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. ?The clarity of David?s argument and the strength of his conviction are truly inspiring. If you don?t believe the world of software affects the world in which you live, you owe it to yourself to read this book.?... more...

  • Penetration Tester's Open Source Toolkitby Jeremy Faircloth; Chris Hurley

    Elsevier Science 2007; US$ 61.95

    Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications... more...

  • The Best Damn Cybercrime and Digital Forensics Book Periodby Jack Wiles; Anthony Reyes

    Elsevier Science 2011; US$ 59.95

    Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible.... more...