The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • The Best Damn IT Security Management Book Periodby Susan Snedaker; Robert McCrie

    Elsevier Science 2011; US$ 62.95

    The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing... more...

  • Understanding Windows CardSpaceby Vittorio Bertocci; Garrett Serack; Caleb Baker

    Pearson Education 2007; US$ 39.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpace is the first insider?s guide... more...

  • Digital Watermarking and Steganographyby Ingemar Cox; Matthew Miller; Jeffrey Bloom; Jessica Fridrich; Ton Kalker

    Elsevier Science 2007; US$ 96.95

    Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties... more...

  • The Best Damn Cybercrime and Digital Forensics Book Periodby Jack Wiles; Anthony Reyes

    Elsevier Science 2011; US$ 59.95

    Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible.... more...

  • Role-Based Access Controlby David F. Ferraiolo

    Artech House 2007; US$ 89.00

    Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners the very... more...

  • Implementing Email and Security Tokensby Sean Turner; Russ Housley

    Wiley 2008; US$ 55.00

    It's your job to make email safe. Where do you start? In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is... more...

  • Oracle Identity Managementby Marlin B. Pohlman

    CRC Press 2008; US$ 89.95

    In today?s competitive marketplace with its focus on profit, maintaining integrity can often be a challenge. Further complicating this challenge is the fact that those assigned to the task of assuring accountability within an organization often have little, if any, visibility into the inner workings of that organization. Oracle Identity Management:... more...

  • Hardware-based Computer Security Techniques to Defeat Hackersby Roger R. Dube

    Wiley 2008; US$ 128.00

    Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed... more...

  • Malware Forensicsby Cameron H. Malin; Eoghan Casey; James M. Aquilina

    Elsevier Science 2008; US$ 69.95

    Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system,... more...

  • Next Generation SSH2 Implementationby Dale Liu

    Elsevier Science 2011; US$ 46.95

    New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features... more...