The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- O'Reilly Media 2014; US$ 42.99
Traditional intrusion detection and logfile analysis are no longer enough to protect today?s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You?ll understand how your network is used, and what actions are necessary to protect... more...
- McGraw-Hill Education 2012; US$ 70.00
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more. more...
- Taylor and Francis 2015; US$ 79.95
This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC)² authorized instructors who are highly knowledgeable about the latest information security-related developments and are proven experts in the CISSP common body of knowledge (CBK). Endorsed by the (ISC)², the Official (ISC) 2® Guide to the CISSP ®... more...
- Springer 2014; US$ 69.99
This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held... more...
- Springer 2014; US$ 54.99
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several... more...
- Springer 2014; US$ 34.99
Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed.... more...
- IT Governance Ltd 2009; US$ 60.00
The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field. more...
- IT Governance Ltd 2009; US$ 18.50
Addressing the scope of risks involved in a modern IT system, this pocket guide outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Since no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview... more...
- Elsevier Science 2005; US$ 84.95
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...
- McGraw-Hill Education 2009; US$ 57.00
"A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project... more...