The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Cisco Secure Firewall Services Module (FWSM)by Ray Blair; Arvind Durai

    Pearson Education 2008; US$ 52.00

    Cisco Secure Firewall Services Module (FWSM)   Best practices for securing networks with FWSM   Ray Blair, CCIEŽ No. 7050 Arvind Durai, CCIE No. 7016   The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the CiscoŽ 6500 switch and 7600 router chassis. The FWSM monitors... more...

  • The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Riskby N.K. McCarthy; Matthew Todd; Jeff Klaben

    McGraw-Hill Education 2012; US$ 60.00

    Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...

  • Testowanie bezpiecze?stwa aplikacji internetowych. Recepturyby Paco Hope; Ben Walther

    Helion 2010; US$ 11.99

    Poznaj i wykorzystaj mechanizmy testowania zabezpiecze?, a nikt nie prze?lizgnie si? przez Twoj? witryn?! Jak zainstalowa? i skonfigurowa? narz?dzia do testo more...

  • The PayPal Official Insider Guide to Internet Securityby Michelle Savage

    Pearson Education 2012; US$ 24.99

    Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can?t afford to hide in the closet. Your customers are online, on their smartphones, and buying goods and services in a virtual market... more...

  • Social Media Securityby Michael Cross

    Elsevier Science 2013; US$ 49.95

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...

  • Take Control of Your Passwordsby Joe Kissell

    TidBITS 2014; US$ 10.00

    Overcome password frustration with Joe Kissell's expert advice! Updated April 29, 2014 Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic. Read the book to understand the problems... more...

  • Web Services Securityby Mark O'Neill

    McGraw-Hill Education 2012; US$ 55.00

    Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...

  • LAN Switch Securityby Eric Vyncke; Christopher Paggen

    Pearson Education 2007; US$ 55.99

    Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], CiscoŽ Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration... more...

  • Email Security with Cisco IronPortby Chris Porter

    Pearson Education 2012; US$ 51.99

    Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today?s messaging environments and shows you how to systematically anticipate and respond to them using Cisco?s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows... more...

  • Security Program and Policiesby Sari Greene

    Pearson Education 2014; US$ 64.00

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today?s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information... more...