The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- CRC Press 2015; US$ 79.95
As a result of a rigorous, methodical process that (ISC)▓ follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)▓ conducts this process on a regular basis to ensure that the examinations and... more...
- Elsevier Science 2014; US$ 69.95
The use of digital surveillance technology is rapidly growing as it becomes significantly cheaper for live and remote monitoring. The second edition of Digital Video Surveillance and Security provides the most current and complete reference for security professionals and consultants as they plan, design, and implement surveillance systems to secure... more...
- Knopf Doubleday Publishing Group 2012; US$ 11.99
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic... more...
- Wiley 2011; US$ 69.99
Sybex is now the official publisher for Certified Wireless Network Professional, the certifying vendor for the CWSP program. This guide covers all exam objectives, including WLAN discovery techniques, intrusion and attack techniques, 802.11 protocol analysis. Wireless intrusion-prevention systems implementation, layer 2 and 3 VPNs used over 802.11... more...
- McGraw-Hill Education 2012; US$ 30.00
From the #1 Name in Professional Certification Prepare for CompTIA Network+ Exam N10-005 with McGraw-Hill?a Gold-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. Get on the fast track to becoming CompTIA Network+ certified with this affordable, portable study... more...
- BCS Learning & Development Limited 2013; US$ 38.99
Authors Acknowledgement Abbreviations Glossary Preface Information security principles Information risk Information security framework Procedural andápeople security controls Technical security controls Software development and life cycle Physical and environmental security Disaster recovery and business continuity management... more...
- Hudson Whitman/Excelsior College Press 2013; US$ 30.00
With a foreword by former U.S. Secretary of Defense Donald Rumsfeld, Protecting Our Future brings together twelve experts from across the cybersecurity spectrum and shines a spotlight on operational challenges and needs across the workforce: in military, health care, international relations, telecommunications, finance, education,... more...
- Wiley 2004; US$ 24.99 US$ 19.99
While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to... more...
- IOS Press 2006; US$ 168.00
The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point... more...
- Springer 2007; US$ 64.95
This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword... more...