The Leading eBooks Store Online

3,603,993 members ⚫ 1,165,375 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CyberWar, CyberTerror, CyberCrimeby Julie E. Mehan

    IT Governance Publishing 2008; US$ 45.95

    CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today’s corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. more...

  • Managing Information Riskby Stewart Mitchell

    IT Governance Ltd 2009; US$ 29.90

    Addressing the scope of risks involved in a modern IT system, this pocket guide outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Since no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview... more...

  • Mobile Application Securityby Himanshu Dwivedi; Chris Clark; David Thiel

    McGraw-Hill Education 2010; US$ 50.00 US$ 41.00

    Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize... more...

  • Security in a Web 2.0+ Worldby Carlos Curtis Solari

    Wiley 2010; US$ 50.00 US$ 43.33

    Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT... more...

  • Introduction to Privacy-Preserving Data Publishingby Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu

    CRC Press 2010; US$ 109.95

    Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction... more...

  • Cloud Securityby Ronald L. Krutz; Russell Dean Vines

    Wiley 2010; US$ 50.00 US$ 35.00

    Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as... more...

  • Securing SQL Serverby Denny Cherry

    Elsevier Science 2010; US$ 49.95

    Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2011; US$ 59.99 US$ 41.99

    Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP... more...

  • The Lureby Steve Schroeder

    Course Technology PTR 2011; US$ 24.99

    The Lure: The True Story of How the Department of Justice Brought Down Two of the World's Most Dangerous Cyber Criminals provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers, and academics... more...

  • IP Address Management Principles and Practiceby Timothy Rooney

    Wiley 2011; US$ 133.00 US$ 115.27

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that... more...