The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Pearson Education 2006; US$ 50.00
Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System Dale Tesch Greg Abelar While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...
- Pearson Education 2011; US$ 27.99
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn how hacker attacks work,... more...
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskMcGraw-Hill Education 2012; US$ 60.00
Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...
- Pearson Education 2012; US$ 24.99
Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can?t afford to hide in the closet. Your customers are online, on their smartphones, and buying goods and services in a virtual market... more...
- Elsevier Science 2013; US$ 49.95
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...
- Scientific American 2013; US$ 5.99
Cyber Hacking: Wars in Virtual Space by the editors of Scientific American Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door... more...
- McGraw-Hill Education 2003; US$ 55.00
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...
- Pearson Education 2012; US$ 51.99
Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today?s messaging environments and shows you how to systematically anticipate and respond to them using Cisco?s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows... more...
- ABC-CLIO 2014; US$ 58.00
Covering topics ranging from web filters to laws aimed at preventing the flow of information, this book explores freedom?and censorship?of the Internet and considers the advantages and disadvantages of policies at each end of the spectrum. more...