The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2012; US$ 80.00
Chapter 1: Becoming a CISSP Chapter 2: Information Security Governance and Risk Management Chapter 3: Access Control Chapter 4: Security Architecture and Design Chapter 5: Physical and Environmental Security Chapter 6: Telecommunications and Network Security Chapter 7: Cryptography Chapter 8: Business Continuity and Disaster Recovery Planning... more...
- CRC Press 2015; US$ 79.95
As a result of a rigorous, methodical process that (ISC)▓ follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)▓ conducts this process on a regular basis to ensure that the examinations and... more...
- McGraw-Hill Education 2012; US$ 30.00
Part 1: Network Fundamentals Objective 1.01: Overview of How Networks Work Objective 1.02: The OSI Seven-Layer Model Objective 1.03: The TCP/IP Model CHECKPOINT Part 2: Network Media Objective 2.01: Coaxial Cabling Objective 2.02: Twisted-Pair Cabling Objective 2.03: Optical Fiber Objective 2.04: Wireless Media Types Part 3: Network... more...
- Wiley 2013; US$ 60.00
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity... more...
- Elsevier Science 2009; US$ 51.95
The Handbook of Digital Forensics and Investigation builds on the success of the Handbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the field.áItáis also designed as an accompanying text to Digital Evidence and Computer... more...
- Oxford University Press, USA 2013; US$ 12.99
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone:... more...
- No Starch Press 2013; US$ 39.95
Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security... more...
- BCS Learning & Development Limited 2014; US$ 30.99
Preface 1. INTRODUCTION 2. INFORMATION SECURITY - ARCHITECTURE FUNDAMENTALS 3. INFORMATION SECURITY - ARCHITECTURE ACTIVITIES 4. THE SECURITY ARCHITECT?S ROLE AND SKILL SET 5. STANDARDS, TOOLS AND TECHNIQUES 6. CAREER PROGRESSION AND RELATED ROLES 7. A DAY IN THE LIFE OF A SECURITY ARCHITECT 8. CONCLUSION Appendix more...
- Elsevier Science 2011; US$ 69.95
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory... more...
- CRC Press 2014; US$ 59.95
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...