The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Introduction to Privacy-Preserving Data Publishingby Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu

    Taylor and Francis 2010; US$ 104.95

    Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction... more...

  • Cloud Securityby Ronald L. Krutz; Russell Dean Vines

    Wiley 2010; US$ 50.00

    Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed,... more...

  • Deploying Microsoft Forefront Threat Management Gateway 2010by Yuri Diogenes; Dr. Thomas W. Shinder

    Microsoft Press 2010; US$ 9.99

    Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and... more...

  • Virtualization and Forensicsby Diane Barrett; Greg Kipper

    Elsevier Science 2010; US$ 59.95

    Virtualized environments are growing quicker than the predicted pace, and according to O?Reilly?s computer book market report, they are the second largest computer book topic in terms of sales for 2008 with a growth of 63%. With more companies using virtual servers and environments, the ability to handle forensic data in this environment will be a... more...

  • Securing SQL Serverby Denny Cherry

    Elsevier Science 2010; US$ 49.95

    Microsoft SQL Server is the most used database platform in the world. Databases hold all of the information that a company uses. These databases have to be properly secured so that people that shouldn't have access are not able to access the data. This book covers the various ways that both employees and outside attackers can break into your database,... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2011; US$ 59.99

    Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP... more...

  • IP Address Management Principles and Practiceby Timothy Rooney

    Wiley 2011; US$ 125.00

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that... more...

  • Voice over IP Securityby Angelos D. Keromytis

    Springer 2011; US$ 39.95

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the... more...

  • CompTIA Security+ Study Guide Authorized Coursewareby Emmett Dulaney

    Wiley 2011; US$ 49.99

    The preparation you need for the new CompTIA Security+ exam SY0-301 This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed... more...

  • CompTIA Security+ Deluxe Study Guide Recommended Coursewareby Emmett Dulaney

    Wiley 2011; US$ 79.99

    Get a host of extras with this Deluxe version including a Security Administration Simulator!   Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition . In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide,... more...