The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- CRC Press 2015; US$ 79.95
As a result of a rigorous, methodical process that (ISC)▓ follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)▓ conducts this process on a regular basis to ensure that the examinations and... more...
- McGraw-Hill Education 2012; US$ 80.00
Chapter 1: Becoming a CISSP Chapter 2: Information Security Governance and Risk Management Chapter 3: Access Control Chapter 4: Security Architecture and Design Chapter 5: Physical and Environmental Security Chapter 6: Telecommunications and Network Security Chapter 7: Cryptography Chapter 8: Business Continuity and Disaster Recovery Planning... more...
- McGraw-Hill Education 2012; US$ 42.00
Ch 1. Introduction Ch 2. Deception Throughout History to Today Ch 3. The Applications & Goals of Cyber Counterintelligence Ch 4. The Missions and Outcomes of Criminal Profiling Ch 5. Legal & Ethical Aspects of Deception Ch 6. Attack Tradecraft Ch 7. Operational Deception Ch 8. Tools, Tactics & Procedures Ch 9. Attack Attribution Ch 10. Black... more...
- British Informatics Society Limited 2010; US$ 33.99
Introduction and purpose 1 General issues in continuity management 2 In practice - the foundations 3 Business impact analysis 4 Business impact analysis report 5 Threats, risks and risk analysis 6 Supporting functions and departments 7 Scenarios 8 Procedures - the last thing to do is think 9 Testing and staying friends 10 Audit 11 Implementation... more...
- Elsevier Science 2012; US$ 59.95
The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals.áThe newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam?s Common Body of Knowledge. The ten domains are covered completely and as concisely as... more...
- BCS Learning & Development Limited 2013; US$ 2.99
BYOD: the pros and cons for end users and the business Technology innovations for today?s workspace A little chat about BYOD To BYOD or not to BYOD - that is the question User-centric technology deployment comes of age Navigating the consumerisation of the IT storm Why IT are on the front line of business management Learning from universities... more...
- Elsevier Science 2013; US$ 49.95
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting,... more...
- Packt Publishing 2015; US$ 51.99
If you wish to develop your practical skills with JIRA in order to install, use, and manage your projects, then this is the perfect book for you. You need to be familiar with software project management and basic computer operations, specifically the system on which you will use JIRA. more...
- O'Reilly Media 2015; US$ 42.99
Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...