The Leading eBooks Store Online

3,964,430 members ⚫ 1,303,930 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Malware Forensicsby Cameron H. Malin; Eoghan Casey; James M. Aquilina

    Elsevier Science 2008; US$ 69.95

    Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve... more...

  • Next Generation SSH2 Implementationby Dale Liu

    Elsevier Science 2011; US$ 46.95

    New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features... more...

  • The Official CHFI Study Guide (Exam 312-49)by Dave Kleiman

    Elsevier Science 2011; US$ 62.95

    This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their... more...

  • The Best of 2600, Collector's Editionby Emmanuel Goldstein

    Wiley 2009; US$ 95.00 US$ 83.50

    In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans of 2600 a compilation of fascinating—and controversial—articles. Cult... more...

  • Inleiding tot de Latijnse Syntaxisby Mieke Koenen

    Amsterdam University Press 2007; US$ 37.90

    The ultimate textbook for latin syntax based on a successful teaching method. more...

  • Secure Telematic Applications for National Scale Projectsby J.-G. Fontaine; M. Makhaniok

    IOS Press 2009; US$ 167.00

    The NATO Advances Research Workshop 'Secure Telematic Applications for National Scale Projects' is organized in the frame of National Week of Information Technologies and 6th International Congress 'Scientific and Methodological Facilitation of the Development of Informatization and the System of Scientific and Technical Information in... more...

  • Identity-Based Cryptographyby M. Joye; G. Neven

    IOS Press 2008; US$ 145.00

    Offers an overview of the state-of-the-art in identity-based cryptography. more...

  • Building Internet Firewallsby Elizabeth D. Zwicky; Simon Cooper; D. Brent Chapman

    O'Reilly Media 2000; US$ 47.99

    In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal... more...

  • Programming .NET Securityby Adam Freeman; Allen Jones

    O'Reilly Media 2003; US$ 39.99

    With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of... more...

  • SQL Injection Attacks and Defenseby Justin Clarke-Salt

    Elsevier Science 2009; US$ 59.95

    Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities... more...