The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Course Technology PTR 2012; US$ 39.99
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand... more...
- McGraw-Hill Education 2012; US$ 60.00
Ch 1. Introduction Ch 2. What Is SCAP Ch 3. SCAP Languages Ch 4. SCAP Enumerations (with case study) Ch 5. SCAP Vulnerability Measurement (with case study) Ch 6. Putting the Pieces Together (with case study) Ch 7. Using SCAP In Your Enterprise (with case study) Ch 8. Emerging SCAP Technologies Ch 9. Conclusion Appendices Index more...
- McGraw-Hill Education 2012; US$ 42.00
Ch 1. Introduction Ch 2. Deception Throughout History to Today Ch 3. The Applications & Goals of Cyber Counterintelligence Ch 4. The Missions and Outcomes of Criminal Profiling Ch 5. Legal & Ethical Aspects of Deception Ch 6. Attack Tradecraft Ch 7. Operational Deception Ch 8. Tools, Tactics & Procedures Ch 9. Attack Attribution Ch 10. Black... more...
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskMcGraw-Hill Education 2012; US$ 60.00
N.K. McCarthy previously managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patch remediation, vulnerability scans, and remediation, penetration... more...
- CRC Press 2012; US$ 76.95
Praise for the popular first edition: This book focuses on the processes that must be employed by an organization to establish a certification and accreditation program based on current federal government criteria? Pat has structured this book to address the key issues in certification and accreditation, including roles and responsibilities,... more...
- Helion 2008; US$ 23.99
Optymalizacja procesu archiwizacji dla administratorów i nie tylko Jak archiwizowa? i odtwarza? system oraz dane? Jak wybra? optymaln? metod? archiwizacji? Jak ograniczy? koszty zwi?zane z procesem archiwizacji? Wdro?enie systemu archiwizacji jest podstawow? czynno?ci?, jak? administrator powinien wykona?. Cel tej procedury jest oczywisty,... more...
- Springer 2010; US$ 559.00
The Handbook of Information and Communication Security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors' intention, with respect to the presentation and sequencing of... more...
- Pearson Education 2012; US$ 31.99
CISSP Practice Questions, Third Edition CISSP Practice Questions Exam Cram , Third Edition complements any CISSP study plan with 1,001 practice test questions in the book and on the CD?all supported by complete explanations of every answer. This package?s highly realistic questions cover every area of knowledge for the new CISSP exam. ... more...
- O'Reilly Media 2012; US$ 67.99
Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis... more...