The Leading eBooks Store Online

4,034,055 members ⚫ 1,328,001 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • A Practical Guide to Trusted Computingby David Challener; Kent Yoder; Ryan Catherman; David Safford; Leendert Van Doorn

    Pearson Education 2007; US$ 39.99

    Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable   Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing... more...

  • Microsoft Security Essentials User Manual (Digital Short Cut)by Michael Miller

    Pearson Education 2009; US$ 4.99

    Microsoft Security Essentials User Manual is the unofficial user's manual for Microsoft's new free anti-malware program. It shows users how to use MSE to safeguard your computer from viruses and spyware, how to download and configure MSE, how to manually scan for malware, how to keep the program updated, and how to schedule regular maintenance. ... more...

  • Effective Monitoring and Alertingby Slawek Ligus

    O'Reilly Media 2012; US$ 15.99

    With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability... more...

  • Security Bibliographyby Safari Content Team

    Safari Books Online 2013; US$ 0.00

    People are increasingly concerned by the security of the information they put online and worry about their privacy and their online profile. With new attacks, information leaks, vulnerabilities and exploits published every week, information security is a constant learning process. To be effective and stay up to date, you need the right resources to... more...

  • Hands-On Oracle Application Express Securityby Recx

    Wiley 2013; US$ 24.99 US$ 21.99

    An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with... more...

  • The CERT Guide to Insider Threatsby Dawn M. Cappelli; Andrew P. Moore; Randall F. Trzeciak

    Pearson Education 2012; US$ 47.99

    Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical... more...

  • IT-Sicherheitsmanagement nach ISO 27001 und Grundschutzby Heinrich Kersten; Jürgen Reuter; Klaus-Dieter Wolfenstetter; Klaus-Werner Schröder

    Springer Fachmedien Wiesbaden 2013; US$ 46.65

    Die Normreihe ISO 27000 und der IT-Grundschutz werden immer wichtiger für Unternehmen und Behörden, die ein IT-Sicherheitsmanagement in ihrer Organisation einführen und betreiben wollen. Im internationalen Kontext ist die Anwendung der ISO 27001 für viele Organisationen nahezu unverzichtbar. Das Buch führt den Leser Schritt für Schritt in diese Standards... more...

  • Cyber Attackby Paul Day

    Carlton Books Ltd 2014; Not Available

    There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made... more...

  • IT-Sicherheit mit Systemby Klaus-Rainer Müller

    Springer Fachmedien Wiesbaden 2014; US$ 46.65

    Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhängig von der Sicherheit und Kontinuität sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgängiges, praxisorientiertes und geschäftszentriertes... more...

  • Enterprise Software Securityby Kenneth R. van Wyk; Mark G. Graff; Dan S. Peters; Ph.D. Diana L. Burley

    Pearson Education 2014; US$ 35.99

    STRENGTHEN SOFTWARE SECURITY BY HELPING DEVELOPERS AND SECURITY EXPERTS WORK TOGETHER   Traditional approaches to securing software are inadequate. The solution: Bring software engineering and network security teams together in a new, holistic approach to protecting the entire enterprise. Now, four highly respected security experts explain... more...