The Leading eBooks Store Online

3,943,133 members ⚫ 1,297,993 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • AAA Identity Management Securityby Vivek Santuka; Premdeep Banga; Brandon James Carroll

    Pearson Education 2010; US$ 59.99

    Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS   AAA solutions are very frequently used by customers to provide secure access to devices and networks AAA solutions are difficult and confusing to implement even though they are almost mandatory Helps IT Pros choose... more...

  • Cisco NAC Applianceby Jamey Heary; Jerry Lin; Chad Sullivan; Alok Agrawal

    Pearson Education 2007; US$ 53.99

    Cisco NAC Appliance Enforcing Host Security with Clean Access   Authenticate, inspect, remediate, and authorize end-point devices using Cisco NAC Appliance   Jamey Heary, CCIE® No. 7680 Contributing authors: Jerry Lin, CCIE No. 6469, Chad Sullivan, CCIE No. 6493, and Alok Agrawal   With today's security challenges... more...

  • End-to-End Network Securityby Omar Santos

    Pearson Education 2007; US$ 51.99

    End-to-End Network Security Defense-in-Depth   Best practices for assessing and improving network defenses and responding to security incidents   Omar Santos   Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout... more...

  • Pentesting Azureby Matt Burrough

    No Starch Press 2018; US$ 39.95

    A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple. A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies... more...

  • Firewall Fundamentalsby Wes Noonan; Ido Dubrawsky

    Pearson Education 2006; US$ 47.99

    The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...

  • IPSec Virtual Private Network Fundamentalsby James Henry Carmouche

    Pearson Education 2006; US$ 51.99

    An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the “big picture”? What are the best practices related to IPS? How is IPS deployed, and... more...

  • Securing VoIP Networksby Peter Thermos; Ari Takanen

    Pearson Education 2007; US$ 43.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing... more...

  • Maximum Linux Security, Adobe Readerby Anonymous; John Ray

    Sams Publishing 2006; US$ 39.99

    Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...

  • Firefox For Dummiesby Blake Ross

    Wiley 2011; US$ 26.99 US$ 23.99

    Firefox For Dummies gives you the inside scoop on the exciting new browser from the Web wizard that got it started. The book's author, Blake Ross, began developing Firefox as a teenager. Once available to the world, the simple and powerful tool was an instant hit claiming a sizable share of the Web browser market with over 140 million downloads.... more...