The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2003; US$ 70.00
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more. more...
- Elsevier Science 2014; US$ 29.95
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering... more...
- Taylor and Francis 2005; US$ 87.95
The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts... more...
- Wiley 2011; US$ 29.99
Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like... more...
- Pearson Education 2006; US$ 45.99
The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...
- Pearson Education 2006; US$ 51.99
An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...
- Elsevier Science 2005; US$ 84.95
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...
- Pearson Education 2006; US$ 51.99
An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...
- Wiley 2007; US$ 21.99
Find out what you should clean, when, and how Dump programs you don't need, archive data, and bring order to your desktop Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning tools that help you organize your data and e-mail, archive... more...
- Pearson Education 2006; US$ 50.00
Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...