The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Getting an Information Security Job For Dummiesby Peter H. Gregory

    Wiley 2015; US$ 23.99

    Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information... more...

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 85.00

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems... more...

  • Hacking Exposed Wireless, Third Editionby Joshua Wright; Johnny Cache

    McGraw-Hill Education 2015; US$ 60.00

    PART 1: WI-FI 1. Introduction to 802.11 Hacking 2. Scanning and Enumerating 802.11 Networks 3. Attacking 802.11 Wireless Networks 4. Attacking WPA-Protected 802.11 Networks 5. Attacking 802.11 Wireless Clients 6. Taking It All the Way: Bridging the Airgap from Windows 8 PART 2: BLUETOOTH 7. Bluetooth Classic Scanning and Reconnaissance 8.... more...

  • CISSP Practice Exams, Third Editionby Shon Harris

    McGraw-Hill Education 2015; US$ 40.00

    Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, a security consultant, an engineer in the U.S. Air Force?s Information Warfare unit, an instructor, and a bestselling author. She consulted with Fortune 100 corporations and government agencies on extensive security issues. more...

  • Zabbix Cookbookby Patrik Uytterhoeven

    Packt Publishing 2015; US$ 35.99

    If you have some experience with Zabbix and wish to take your infrastructure to the next level, then this book is for you. Before you start with Zabbix, or monitoring in general, it is best to have some basic Linux knowledge and a good understanding of snmp, virtualization, and scripting. more...

  • The CISO Handbookby Michael Gentile; Ron Collette; Thomas D. August

    Taylor and Francis 2005; US$ 87.95

    The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts... more...

  • Firewall Fundamentalsby Wes Noonan; Ido Dubrawsky

    Pearson Education 2006; US$ 45.99

    The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...

  • IPSec Virtual Private Network Fundamentalsby James Henry Carmouche

    Pearson Education 2006; US$ 51.99

    An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...

  • IM Instant Messaging Securityby John CISM PhD Rittinghouse; James F. CISSP CISM PhD Ransome

    Elsevier Science 2005; US$ 84.95

    BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...