The Leading eBooks Store Online

4,011,120 members ⚫ 1,318,789 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Information Security Management Handbook, Sixth Editionby Harold F. Tipton; Micki Krause

    CRC Press 2007; US$ 243.00

    Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the... more...

  • Information Assurance and Computer Securityby J.P. Thomas; M. Essaaidi

    IOS Press 2006; US$ 183.00

    Today’s society can no longer function without information technology. Essential infrastructure including the transportation system, banking, the entertainment industry, the health care system, government, the military and the education system can no longer survive without modern technology. This increasing dependence on information technology creates... more...

  • Digital Data Integrityby David B Little; Skip Farmer; Oussama El-Hilali

    Wiley 2007; US$ 123.00 US$ 110.70

    How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability,... more...

  • Phishing and Countermeasuresby Markus Jakobsson; Steven Myers

    Wiley 2006; US$ 122.00 US$ 109.80

    Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate... more...

  • The Business Case for Network Securityby Catherine Paquet; Warren Saxe

    Pearson Education 2004; US$ 39.99

    Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel... more...

  • Checkpoint Next Generation Security Administrationby Syngress

    Elsevier Science 2002; US$ 59.95

    Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking... more...

  • CheckPoint NG VPN 1/Firewall 1by Syngress

    Elsevier Science 2003; US$ 61.95

    Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security... more...

  • Hacker's Challenge 3by David Pollino; Bill Pennington; Tony Bradley; Himanshu Dwivedi

    McGraw-Hill Education 2010; US$ 58.00

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker’s Challenge 3 . Inside, top-tier security experts offer 20 brand-new, real-world network... more...

  • Building an Information Security Awareness Programby Mark B. Desman

    CRC Press 2001; US$ 109.95

    In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can... more...

  • Professional Rootkitsby Ric Vieler

    Wiley 2007; US$ 49.99 US$ 43.99

    Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing... more...