The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Elsevier Science 2013; US$ 49.95
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage... more...
- Elsevier Science 2013; US$ 59.95
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide... more...
- Taylor and Francis 2013; US$ 99.95
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation... more...
- Elsevier Science 2013; US$ 49.95
This book serves as a security practitioner?s guide to today?s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure... more...
- Taylor and Francis 2014; US$ 79.95
The first major publication on mass fatality management when it was published in 1999, the new edition of this bestseller is greatly revised and expanded. Eight new chapters include such topics as international resources, multi-national events, data management, identification management, repatriation, mass burial, and management of contaminated human... more...
- TidBITS 2014; US$ 10.00
Updated May 20, 2014 Speed through Web logins with 1Password 4! Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter Web login data... more...
- Springer 2013; US$ 39.99
Sie sind ein erfolgreicher Hacker, finden jede Sicherheitslücke, überwinden jede Firewall und sind es gewohnt, immer an Ihr Ziel zu kommen? Dann haben wir jetzt schlechte Nachrichten für Sie: Dieses Buch wird Ihnen das Leben schwer machen! Dem Autor gelingt es, solide und verständlich das Hintergrundwissen über Netzwerk- und Datensicherheit zu vermitteln,... more...
- O'Reilly Media 2014; US$ 42.99
Traditional intrusion detection and logfile analysis are no longer enough to protect today?s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You?ll understand how your network is used, and what actions are necessary to protect... more...
- McGraw-Hill Education 2012; US$ 70.00
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more. more...