The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Morgan & Claypool Publishers 2014; US$ 40.00
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintain perfect integrity of the original multimedia "cover... more...
- Course Technology PTR 2012; US$ 39.99
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand... more...
- McGraw-Hill Education 2012; US$ 60.00
Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative,... more...
- McGraw-Hill Education 2012; US$ 42.00
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. ... more...
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskMcGraw-Hill Education 2012; US$ 60.00
Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...
- CRC Press 2012; US$ 76.95
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP ® ) Common Body of Knowledge (CBK ® ) and NIST SP 800-37, the... more...
- Helion 2008; US$ 23.99
Optymalizacja procesu archiwizacji dla administratorów i nie tylko Jak archiwizowa? i odtwarza? system oraz dane? Jak wybra? optymaln? metod? archiwizacji? Jak ograniczy? koszty zwi?zane z procesem archiwizacji? Wdro?enie systemu archiwizacji jest podstawow? czynno?ci?, jak? administrator powinien wykona?. Cel tej procedury jest oczywisty,... more...
- Pearson Education 2012; US$ 31.99
CISSP Practice Questions, Third Edition CISSP Practice Questions Exam Cram , Third Edition complements any CISSP study plan with 1,001 practice test questions in the book and on the CD?all supported by complete explanations of every answer. This package?s highly realistic questions cover every area of knowledge for the new CISSP exam. ... more...
- O'Reilly Media 2012; US$ 67.99
Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis... more...