The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Security in a Web 2.0+ Worldby Carlos Curtis Solari

    Wiley 2010; US$ 50.00

    Discover how technology is affecting your business, and whytypical security mechanisms are failing to address the issue ofrisk and trust. Security for a Web 2.0+ World looks at the perplexing issues ofcyber security, and will be of interest to those who need to knowhow to make effective security policy decisions to engineers whodesign ICT systems... more...

  • Introduction to Privacy-Preserving Data Publishingby Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu

    CRC Press 2010; US$ 109.95

    THE FUNDAMENTALS Introduction Data Collection and Data Publishing What Is Privacy-Preserving Data Publishing? Related Research Areas Attack Models and Privacy Models Record Linkage Model Attribute Linkage Model Table Linkage Model Probabilistic Model Modeling Adversary?s Background Knowledge Anonymization Operations Generalization... more...

  • Cloud Securityby Ronald L. Krutz; Russell Dean Vines

    Wiley 2010; US$ 50.00

    Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as... more...

  • Virtualization and Forensicsby Diane Barrett; Greg Kipper

    Elsevier Science 2010; US$ 59.95

    Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments provides an introduction to virtualized environments and their implications on forensic investigations. It emphasizes the need for organizations using virtualization to be proactive rather than reactive. Being proactive means learning the methods in this book... more...

  • Securing SQL Serverby Denny Cherry

    Elsevier Science 2010; US$ 49.95

    Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2011; US$ 59.99

    Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP... more...

  • The Lureby Steve Schroeder

    Course Technology PTR 2011; US$ 24.99

    The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers, and academics... more...

  • IP Address Management Principles and Practiceby Timothy Rooney

    Wiley 2011; US$ 129.00

    A hands-on resource for rigorous, state-of-the-art management of today's IP networks Effective IP address management (IPAM) is a key ingredient in an enterprise or service provider IP network management strategy. The practice entails the application of network management disciplines to Internet Protocol (IP) address space and associated network... more...

  • Privacy and Big Databy Terence Craig; Mary E. Ludloff

    O'Reilly Media 2011; US$ 16.99

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected,... more...

  • Intelligence Managementby Babak Akhgar; Simeon Yates

    Springer London 2011; US$ 129.00

    This book address the link between law enforcement, the uses of and developments in information and communication technologies (ICTs) and key ideas about the management of information, intelligence and knowledge. more...