The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CISSP All-in-One Exam Guide, 6th Editionby Shon Harris

    McGraw-Hill Education 2012; US$ 80.00

    Chapter 1: Becoming a CISSP Chapter 2: Information Security Governance and Risk Management Chapter 3: Access Control Chapter 4: Security Architecture and Design Chapter 5: Physical and Environmental Security Chapter 6: Telecommunications and Network Security Chapter 7: Cryptography Chapter 8: Business Continuity and Disaster Recovery Planning... more...

  • Official (ISC)2 Guide to the CISSP CBK, Fourth Editionby Adam Gordon

    CRC Press 2015; US$ 79.95

    As a result of a rigorous, methodical process that (ISC)▓ follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)▓ conducts this process on a regular basis to ensure that the examinations and... more...

  • Mike Meyers? CompTIA Network+ Certification Passport, 4th Edition (Exam N10-005)by Michael Meyers; Scott Jernigan

    McGraw-Hill Education 2012; US$ 30.00

    Part 1: Network Fundamentals Objective 1.01: Overview of How Networks Work Objective 1.02: The OSI Seven-Layer Model Objective 1.03: The TCP/IP Model CHECKPOINT Part 2: Network Media Objective 2.01: Coaxial Cabling Objective 2.02: Twisted-Pair Cabling Objective 2.03: Optical Fiber Objective 2.04: Wireless Media Types Part 3: Network... more...

  • Cybersecurityby Thomas J. Mowbray

    Wiley 2013; US$ 60.00

    A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity... more...

  • Handbook of Digital Forensics and Investigationby Eoghan Casey

    Elsevier Science 2009; US$ 51.95

    The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.áItáis also designed as an accompanying text to Digital Evidence and Computer... more...

  • Cybersecurity and Cyberwarby Peter W. Singer; Allan Friedman

    Oxford University Press, USA 2013; US$ 12.99

    A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone:... more...

  • The Practice of Network Security Monitoringby Richard Bejtlich

    No Starch Press 2013; US$ 39.95

    Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security... more...

  • Security Architectby Jon Collins

    BCS Learning & Development Limited 2014; US$ 30.99

    Preface 1. INTRODUCTION 2. INFORMATION SECURITY - ARCHITECTURE FUNDAMENTALS 3. INFORMATION SECURITY - ARCHITECTURE ACTIVITIES 4. THE SECURITY ARCHITECT?S ROLE AND SKILL SET 5. STANDARDS, TOOLS AND TECHNIQUES 6. CAREER PROGRESSION AND RELATED ROLES 7. A DAY IN THE LIFE OF A SECURITY ARCHITECT 8. CONCLUSION Appendix more...

  • Digital Evidence and Computer Crimeby Eoghan Casey

    Elsevier Science 2011; US$ 69.95

    Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory... more...

  • Ethical Hacking and Penetration Testing Guideby Rafay Baloch

    CRC Press 2014; US$ 59.95

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...