The Leading eBooks Store Online

4,319,012 members ⚫ 1,429,817 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guideby Charles L. Brooks

    McGraw-Hill Education 2014; US$ 50.00

    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative... more...

  • Surviving Cyberwarby Richard Stiennon

    Government Institutes 2010; US$ 47.50

    This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines... more...

  • CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guideby James M. Stewart; Mike Chapple; Darril Gibson

    Wiley 2015; US$ 70.00 US$ 61.50

    CISSP Study Guide -  fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the... more...

  • File System Forensic Analysisby Brian Carrier

    Pearson Education 2005; US$ 55.99

    The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques   Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian... more...

  • How Personal & Internet Security Worksby Preston Gralla

    Pearson Education 2006; US$ 23.99

    In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004.... more...

  • Deploying Zone-Based Firewalls (Digital Short Cut)by Ivan Pepelnjak

    Pearson Education 2006; US$ 14.99

    Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1   Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the grouping of physical and virtual interfaces into zones to simplify... more...

  • Cheating Online Games (Digital Short Cut)by Gary R. McGraw; Greg Hoglund

    Pearson Education 2006; US$ 14.99

    This is the eBook version of the printed book. This digital Short Cut, delivered in Adobe PDF format for quick and easy access, is an introduction to issues with cheating and anti-cheating countermeasures in the online gaming industry.   At present, the online game World of Warcraft has approximately six million subscribers worldwide. At... more...

  • Mainframe Basics for Security Professionalsby Ori Pomerantz; Barbara Vander Weele; Mark Nelson; Tim Hahn

    Pearson Education 2007; US$ 43.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. Leverage Your Security Expertise in IBM ® System z™ Mainframe Environments   For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the... more...

  • Practical Intrusion Analysisby Ryan Trost

    Pearson Education 2009; US$ 43.99

    “ Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”    –Nate Miller, Cofounder, Stratum Security   The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention   Recently, powerful innovations in intrusion detection and prevention... more...

  • Cisco Secure Firewall Services Module (FWSM)by Ray Blair; Arvind Durai

    Pearson Education 2008; US$ 52.00

    This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.   The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors... more...