The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Deploying Microsoft Forefront Threat Management Gateway 2010by Yuri Diogenes; Dr. Thomas W. Shinder

    Microsoft Press 2010; US$ 9.99

    Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and... more...

  • Virtualization and Forensicsby Diane Barrett; Greg Kipper

    Elsevier Science 2010; US$ 59.95

    Virtualized environments are growing quicker than the predicted pace, and according to O?Reilly?s computer book market report, they are the second largest computer book topic in terms of sales for 2008 with a growth of 63%. With more companies using virtual servers and environments, the ability to handle forensic data in this environment will be a... more...

  • Securing SQL Serverby Denny Cherry

    Elsevier Science 2010; US$ 49.95

    Microsoft SQL Server is the most used database platform in the world. Databases hold all of the information that a company uses. These databases have to be properly secured so that people that shouldn't have access are not able to access the data. This book covers the various ways that both employees and outside attackers can break into your database,... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2011; US$ 59.99

    Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP... more...

  • The Lureby Steve Schroeder

    Course Technology PTR 2011; US$ 24.99

    The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers, and academics... more...

  • IP Address Management Principles and Practiceby Timothy Rooney

    Wiley 2011; US$ 125.00

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that... more...

  • Voice over IP Securityby Angelos D. Keromytis

    Springer 2011; US$ 39.95

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the... more...

  • CompTIA Security+ Study Guide Authorized Coursewareby Emmett Dulaney

    Wiley 2011; US$ 49.99

    The preparation you need for the new CompTIA Security+ exam SY0-301 This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed... more...

  • CompTIA Security+ Deluxe Study Guide Recommended Coursewareby Emmett Dulaney

    Wiley 2011; US$ 79.99

    Get a host of extras with this Deluxe version including a Security Administration Simulator!   Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition . In addition to the 100% coverage of all exam essentials and study tools you'll find in the regular study guide,... more...

  • CompTIA Security+ Review Guideby James M. Stewart

    Wiley 2011; US$ 29.99

    This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this book to be essential reading if you are studying for Security+ certification and... more...