The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • The Network Security Test Labby Michael Gregg

    Wiley 2015; US$ 50.00

    The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process,... more...

  • Getting an Information Security Job For Dummiesby Peter H. Gregory

    Wiley 2015; US$ 23.99

    The fast and easy way to get a job in Information Security Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information... more...

  • Cooperative Anonymous Message Authentication in Vehicular Ad Hoc Networksby Xiaodong Lin; Rongxing Lu

    Wiley 2015; US$ 135.00

    This book discusses the unique design requirements for security and privacy preservation for vehicular communications. Then, it will focus on some challenges in order to achieve message authentication and preserve privacy, i.e., anonymous message authentication, for which no strategy exists. This book is a comprehensive, single information source... more...

  • Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Editionby Daniel Regalado; Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness; Branko Spasojevic; Ryan Linn; Stephen Sims

    McGraw-Hill Education 2015; US$ 60.00

    Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy?s current weapons, skills, and tactics... more...

  • The CISO Handbookby Michael Gentile; Ron Collette; Thomas D. August

    Taylor and Francis 2005; US$ 87.95

    The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts... more...

  • Firewall Fundamentalsby Wes Noonan; Ido Dubrawsky

    Pearson Education 2006; US$ 45.99

    The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...

  • IPSec Virtual Private Network Fundamentalsby James Henry Carmouche

    Pearson Education 2006; US$ 51.99

    An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...

  • Security Threat Mitigation and Responseby Dale Tesch; Greg Abelar

    Pearson Education 2006; US$ 50.00

    Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System   Dale Tesch Greg Abelar   While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...

  • SUSE LINUX Enterprise Server 9 Administrator's Handbookby Peter Kuo; Jacques Beland

    Pearson Education 2005; US$ 39.99

    As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through... more...