The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Hop Integrity in the Internetby Chin-Tser Huang; Mohamed G. Gouda

    Springer-Verlag New York Inc 2006; US$ 149.00

    Introduces a security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. This book discusses a suite of protocols for providing hop integrity in the Internet. Each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation. more...

  • Building an Information Security Awareness Programby Mark B. Desman

    CRC Press 2001; US$ 109.95

    GETTING STARTED Reviewing the Provisions the Company Now Has in Place Learning the Players-Where the Power Resides Learning the Corporate Culture-What Can Work Here, What Cannot Obtaining Management Buyoff-How to Present the Case Finding Communications Vehicles Currently in Place ESTABLISHING A BASELINE Review All Company Polices, Procedures, Standards,... more...

  • Professional Rootkitsby Ric Vieler

    Wiley 2007; US$ 49.99

    Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing... more...

  • Cyberspace Security and Defenseby Janusz S. Kowalik; Janusz Gorski; Anatoly Sachenko

    Springer 2006; US$ 149.00

    Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities... more...

  • Applied Cryptanalysisby Mark Stamp; Richard M. Low

    Wiley 2007; US$ 124.00

    Mark Stamp , PhD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice. Richard M. Low , PhD, is Lecturer in the... more...

  • Data Warehousing and Data Mining Techniques for Cyber Securityby Anoop Singhal

    Springer-Verlag New York Inc 2007; US$ 169.00

    Dealing with security informatics, this book discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. It introduces techniques for applications in the area of retail, finance, and bioinformatics. It is useful for upper undergraduate and graduate-level students in computer science. more...

  • The CEH Prep Guideby Ronald L. Krutz; Russell Dean Vines

    Wiley 2008; US$ 50.00

    RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series. RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE,... more...

  • Cryptology Unlockedby Reinhard Wobst; Angelika Shafir

    Wiley 2007; US$ 50.00

    Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...

  • CISO Leadershipby Todd Fitzgerald; Micki Krause

    CRC Press 2007; US$ 89.95

    A LEADERSHIP DISCONNECT What You Told Us: A CISO Survey, T. Fitzgerald A LEADERSHIP MANDATE Who Companies Really Want to HIRE: How to Advance Your Career and Have Great Success, J. Brocaglia The Evolving Information Security Landscape, W.H. Murray Business Drivers for Information Security, H. DeMaio Security as a Business... more...

  • Geekonomicsby David Rice

    Pearson Education 2007; US$ 27.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. ?The clarity of David?s argument and the strength of his conviction are truly inspiring. If you don?t believe the world of software affects the world in which you live, you owe it to yourself to read this book.?... more...