The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Wiley 2006; US$ 114.00
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate... more...
- Pearson Education 2006; US$ 48.00
Cisco Network Admission Control Volume II: NAC Framework Deployment and Troubleshooting The self-defending network in action Jazib Frahim, CCIEŽ No. 5459 Omar Santos David White, Jr., CCIE No. 12,021 When most information security professionals think about threats to their networks, they think about the threat of attackers... more...
- Emerald Group Publishing Limited 2004; US$ 199.00
We have not seen an Internet-based game that can be identified with the arrival of Internet gaming for the masses. Due to the foundational structure of the Internet, there probably will not be one anytime soon. The problem is that the underlying Internet protocol, IPv4, has not had a major update since its introduction in the early 1970s. Fortunately,... more...
- Pearson Education 2004; US$ 39.99
Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel... more...
- Elsevier Science 2003; US$ 61.95
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security... more...
- Wiley 2007; US$ 115.00
How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability,... more...
- Wiley 2007; US$ 49.99
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing... more...
- Wiley 2007; US$ 120.00
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... more...
- Springer 2006; US$ 149.00
Cyberspace security is a critical subject of our times. On one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities... more...
- Taylor and Francis 2001; US$ 104.95
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can... more...