The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Reversible Digital Watermarkingby Ruchira Naskar; Rajat Subhra Chakraborty

    Morgan & Claypool Publishers 2014; US$ 40.00

    Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintain perfect integrity of the original multimedia "cover... more...

  • Hands-On Ethical Hacking and Network Defenseby Michael T. Simpson

    Course Technology PTR 2012; US$ 39.99

    It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand... more...

  • Monitoring i bezpiecze?stwo sieciby Chris Fry; Martin Nystrom

    Helion 2012; US$ 9.99

    Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy? more...

  • Official (ISC)2® Guide to the CAP® CBK®, Second Editionby Patrick D. Howard

    CRC Press 2012; US$ 76.95

    Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP ® ) Common Body of Knowledge (CBK ® ) and NIST SP 800-37, the... more...

  • Archiwizacja i odzyskiwanie danychby W. Curtis Preston

    Helion 2008; US$ 23.99

    Optymalizacja procesu archiwizacji dla administratorów i nie tylko Jak archiwizowa? i odtwarza? system oraz dane? Jak wybra? optymaln? metod? archiwizacji? Jak ograniczy? koszty zwi?zane z procesem archiwizacji? Wdro?enie systemu archiwizacji jest podstawow? czynno?ci?, jak? administrator powinien wykona?. Cel tej procedury jest oczywisty,... more...

  • CISSP Practice Questions Exam Cramby Michael Gregg

    Pearson Education 2012; US$ 31.99

    CISSP Practice Questions, Third Edition   CISSP Practice Questions Exam Cram , Third Edition complements any CISSP study plan with 1,001 practice test questions in the book and on the CD?all supported by complete explanations of every answer. This package?s highly realistic questions cover every area of knowledge for the new CISSP exam. ... more...

  • Juniper MX Seriesby Jr. Douglas Richard Hanks; Harry Reynolds

    O'Reilly Media 2012; US$ 67.99

    Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis... more...

  • 125 sposobów na bezpiecze?stwo sieci. Wydanie IIby Andrew Lockhart

    Helion 2007; US$ 15.00

    Praktyczny przewodnik po technikach zabezpieczania sieci komputerowych Jak sprawnie zabezpieczy? system? Jak zapewni? sobie prywatno?? w internecie? Jak skutecznie walczy? z sieciowymi w?amywaczami? W naszych domach montujemy solidne zamki i drzwi, chronimy samochody wymy?lnymi alarmami, w firmach zak?adamy systemy monitoringu,... more...

  • CISSP Exam Cramby Michael Gregg

    Pearson Education 2012; US$ 39.99

    This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through product registration at Pearson IT Certification; or see instructions in back pages of your eBook.   CISSP Exam Cram,... more...

  • Windows 2012 Server Network Securityby Derrick Rountree

    Elsevier Science 2013; US$ 49.95

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations... more...