The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Cisco Firewall Technologies (Digital Short Cut)by Andrew Mason

    Pearson Education 2007; US$ 9.99

    Cisco Firewall Technologies (Digital Short Cut) Andrew Mason ISBN-10: 1-58705-329-2 ISBN-13: 978-1-58705-329-0   Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these technologies are represented in the Cisco® firewall... more...

  • [Read Me First] Building or Buying VPNs (Digital Short Cut)by Kunjal Trivedi

    Pearson Education 2007; US$ 9.99

    [Read Me First]: Building or Buying VPNs (Digital Short Cut) Kunjal Trivedi ISBN-10: 1-58720-134-8 ISBN-13: 978-1-58720-134-9   One of the most popular approaches to establishing a secure computing and network environment is the virtual private network (VPN), which enables organizations to use Internet transport securely to... more...

  • The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Riskby N.K. McCarthy; Matthew Todd; Jeff Klaben

    McGraw-Hill Education 2012; US$ 60.00

    Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...

  • Testowanie bezpiecze?stwa aplikacji internetowych. Recepturyby Paco Hope; Ben Walther

    Helion 2010; US$ 11.99

    Poznaj i wykorzystaj mechanizmy testowania zabezpiecze?, a nikt nie prze?lizgnie si? przez Twoj? witryn?! Jak zainstalowa? i skonfigurowa? narz?dzia do testo more...

  • The PayPal Official Insider Guide to Internet Securityby Michelle Savage

    Pearson Education 2012; US$ 24.99

    Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can?t afford to hide in the closet. Your customers are online, on their smartphones, and buying goods and services in a virtual market... more...

  • Social Media Securityby Michael Cross

    Elsevier Science 2013; US$ 49.95

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...

  • Web Services Securityby Mark O'Neill

    McGraw-Hill Education 2012; US$ 55.00

    Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...

  • Email Security with Cisco IronPortby Chris Porter

    Pearson Education 2012; US$ 51.99

    Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today?s messaging environments and shows you how to systematically anticipate and respond to them using Cisco?s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows... more...

  • LAN Switch Securityby Eric Vyncke; Christopher Paggen

    Pearson Education 2007; US$ 55.99

    Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration... more...

  • Security Program and Policiesby Sari Greene

    Pearson Education 2014; US$ 64.00

    Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today?s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information... more...