The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Self-Defending Networksby Duane De Capite

    Pearson Education 2006; US$ 36.00

    Protect your network with self-regulating network security solutions that combat both internal and external threats. Provides an overview of the security components used to design proactive network security Helps network security professionals understand what the latest tools and techniques can do and how they interact Presents detailed... more...

  • Cisco Router Firewall Security, Adobe Readerby Richard Deal

    Pearson Education 2004; US$ 55.99

    Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic ... more...

  • MPLS VPN Securityby Michael H. Behringer; Monique J. Morrow

    Pearson Education 2005; US$ 55.99

    A practical guide to hardening MPLS networks  Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network?s backbone, misconfigurations, sniffing, and inside... more...

  • IPSec VPN Designby Vijay Bollapragada; Mohamed Khalid; Scott Wainner

    Pearson Education 2005; US$ 51.00

    The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane... more...

  • Network Security Architecturesby Sean Convery

    Pearson Education 2004; US$ 52.00

    Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs,... more...

  • Designing Network Securityby Merike Kaeo

    Pearson Education 2003; US$ 55.99

    A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network... more...

  • OECD Anti-Spam Toolkit of Recommended Policies and Measuresby OECD Publishing

    Organisation for Economic Co-operation and Development 2006; US$ 37.00

    In view of the wide impact of spam, and the potential for further problems as a result of the convergence of communication technologies and the emergence of ubiquitous communications and mobile Internet, the OECD brought together policy makers and industry experts to form the OECD Task Force on Spam. They were charged with developing a framework aimed... more...

  • Ajax Securityby Billy Hoffman; Bryan Sullivan

    Pearson Education 2007; US$ 43.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities   More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly... more...

  • Dr. Tom Shinder's ISA Server 2006 Migration Guideby Thomas W Shinder

    Elsevier Science 2011; US$ 51.95

    Dr. Tom Shinder?s ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which... more...

  • The New School of Information Security, Adobe Readerby Adam Shostack; Andrew Stewart

    Pearson Education 2008; US$ 23.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. ?It is about time that a book like The New School came along. The age of security as pure technology is long past, and modern practitioners need to understand the social and cognitive aspects of security... more...