The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Introduction to Privacy-Preserving Data Publishingby Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu

    Taylor and Francis 2010; US$ 104.95

    Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction... more...

  • Deploying Microsoft Forefront Threat Management Gateway 2010by Yuri Diogenes; Dr. Thomas W. Shinder

    Microsoft Press 2010; US$ 9.99

    Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and... more...

  • Virtualization and Forensicsby Diane Barrett; Greg Kipper

    Elsevier Science 2010; US$ 59.95

    Virtualized environments are growing quicker than the predicted pace, and according to O?Reilly?s computer book market report, they are the second largest computer book topic in terms of sales for 2008 with a growth of 63%. With more companies using virtual servers and environments, the ability to handle forensic data in this environment will be a... more...

  • Securing SQL Serverby Denny Cherry

    Elsevier Science 2010; US$ 49.95

    Microsoft SQL Server is the most used database platform in the world. Databases hold all of the information that a company uses. These databases have to be properly secured so that people that shouldn't have access are not able to access the data. This book covers the various ways that both employees and outside attackers can break into your database,... more...

  • The Lureby Steve Schroeder

    Course Technology PTR 2011; US$ 24.99

    The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers, and academics... more...

  • Voice over IP Securityby Angelos D. Keromytis

    Springer 2011; US$ 39.95

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the... more...

  • CompTIA Security+ Review Guideby James M. Stewart

    Wiley 2011; US$ 29.99

    This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this book to be essential reading if you are studying for Security+ certification and... more...

  • At Largeby David H. Freedman; Charles C. Mann

    Touchstone 1998; Not Available

    Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever. At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer... more...

  • CompTIA Security+ SY0-301 Authorized Practice Questions Exam Cramby Diane Barrett

    Pearson Education 2011; US$ 27.99

    CompTIAŽ Security+ SY0-301 Practice Questions Exam Cram , Third Edition, offers all the exam practice you?ll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book complements any Security+ study plan with more than 800 practice test questions?all supported with complete explanations... more...

  • Network Security First-Stepby Thomas M. Thomas; Donald Stoddard

    Pearson Education 2011; US$ 27.99

    Network Security first-step Second Edition   Tom Thomas and Donald Stoddard   Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy   Your first step to network security begins here! Learn how hacker attacks work,... more...