The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Wiley 2007; US$ 65.00
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of... more...
- McGraw-Hill Education 2009; US$ 57.00
"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project... more...
- Course Technology PTR 2007; US$ 49.99
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security concerns... more...
- IT Governance Ltd 2009; US$ 60.00
The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field. more...
- IT Governance Publishing 2008; US$ 45.95
CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that todays corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. more...
- IT Governance Ltd 2009; US$ 18.50
Addressing the scope of risks involved in a modern IT system, this pocket guide outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Since no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview... more...
- Wiley 2010; US$ 50.00
Discover how technology is affecting your business, and whytypical security mechanisms are failing to address the issue ofrisk and trust. Security for a Web 2.0+ World looks at the perplexing issues ofcyber security, and will be of interest to those who need to knowhow to make effective security policy decisions to engineers whodesign ICT systems... more...
- Wiley 2010; US$ 50.00
Well-known security experts decipher the most challenging aspect ofcloud computing-security Cloud computing allows for both large and small organizations tohave the opportunity to use Internet-based services so that theycan reduce start-up costs, lower capital expenditures, use serviceson a pay-as-you-use basis, access applications only as needed,... more...
- Elsevier Science 2010; US$ 59.95
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments provides an introduction to virtualized environments and their implications on forensic investigations. It emphasizes the need for organizations using virtualization to be proactive rather than reactive. Being proactive means learning the methods in this book... more...
- Elsevier Science 2010; US$ 49.95
Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing... more...