The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Web 2.0 Securityby Shreeraj Shah

    Course Technology PTR 2007; US$ 49.99

    Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security concerns... more...

  • CyberWar, CyberTerror, CyberCrimeby Julie E. Mehan

    IT Governance Publishing 2008; US$ 45.95

    CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today’s corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. more...

  • Microsoft® Forefront? Threat Management Gateway (TMG) Administrator's Companionby Yuri Diogenes; Jim Harrison; Mohit Saxena

    Microsoft Press 2010; US$ 47.99

    Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management... more...

  • Security in a Web 2.0+ Worldby Carlos Curtis Solari

    Wiley 2010; US$ 50.00

    Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems... more...

  • Introduction to Privacy-Preserving Data Publishingby Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu

    Taylor and Francis 2010; US$ 104.95

    Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction... more...

  • Deploying Microsoft Forefront Threat Management Gateway 2010by Yuri Diogenes; Dr. Thomas W. Shinder

    Microsoft Press 2010; US$ 9.99

    Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and... more...

  • The Lureby Steve Schroeder

    Course Technology PTR 2011; US$ 24.99

    The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers, and academics... more...

  • Voice over IP Securityby Angelos D. Keromytis

    Springer 2011; US$ 39.95

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the... more...

  • Privacy and Big Databy Terence Craig; Mary E. Ludloff

    O'Reilly Media 2011; US$ 16.99

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected,... more...

  • At Largeby Charles C. Mann; David H. Freedman

    Touchstone 1998; Not Available

    Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever. At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer... more...