The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • .NET Development Security Solutionsby John Paul Mueller

    Wiley 2006; US$ 49.99

    The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to teach you the right techniques for most scenarios you're likely to encounter. This is not an introduction to security; it's an advanced cookbook that... more...

  • 125 sposobów na bezpiecze?stwo sieci. Wydanie IIby Andrew Lockhart

    Helion 2012; US$ 15.00

    Praktyczny przewodnik po technikach zabezpieczania sieci komputerowych Jak sprawnie zabezpieczy? system? Jak zapewni? sobie prywatno?? w internecie? Jak skutecznie walczy? z sieciowymi w?amywaczami? W naszych domach montujemy solidne zamki i drzwi, chronimy samochody wymy?lnymi alarmami, w firmach zak?adamy systemy monitoringu,... more...

  • 21st Century Chinese Cyberwarfareby William T. Hagestad

    IT Governance Publishing 2012; US$ 75.00

    21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author’s personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People’s Republic of China is using a combination of their unique culture, language,... more...

  • 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Themby Michael Howard; David LeBlanc; John Viega

    McGraw-Hill Education 2009; US$ 52.00

    "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years... more...

  • The 7 Qualities of Highly Secure Softwareby Mano Paul

    Taylor and Francis 2012; US$ 52.95

    The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies?ranging from Aesop?s fables, athletics, architecture, biology, nursery rhymes, and video games?to illustrate the qualities that are essential for the development of highly secure... more...

  • 802.11 Wireless Networksby Alan Holt; Chi-Yu Huang

    Springer 2010; US$ 139.00

    This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every component of... more...

  • 802.1X Port-Based Authenticationby Edwin Lyle Brown

    Taylor and Francis 2006; US$ 91.95

    Port-based authentication is a ?network access control? concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today.... more...

  • @Warby Shane Harris

    Houghton Mifflin Harcourt 2014; US$ 27.00

    An investigation into how the Pentagon, NSA, and other government agencies are uniting with corporations to fight in cyberspace, the next great theater of war. more...

  • A+, Network+, Security+ Exams in a Nutshellby Pawan K. Bhardwaj

    O'Reilly Media 2007; US$ 43.99

    If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization.... more...

  • AAA and Network Security for Mobile Accessby Madjid Nakhjiri; Mahsa Nakhjiri

    Wiley 2005; US$ 135.00

    AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.  AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter... more...