The Leading eBooks Store Online

4,003,177 members ⚫ 1,317,278 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Applied Cryptanalysisby Mark Stamp; Richard M. Low

    Wiley 2007; US$ 128.00 US$ 115.20

    The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... more...

  • Basics Of Contemporary Cryptography For It Practitionersby Boris Ryabko; Andrey Fionov

    World Scientific Publishing Company 2005; US$ 79.00 US$ 71.89

    The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and... more...

  • Security Planning and Disaster Recoveryby Eric Maiwald; William Sieglein

    McGraw-Hill Education 2002; US$ 43.95

    Proactively implement a successful security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions. more...

  • The Shellcoder's Handbookby Chris Anley; John Heasman; Felix Lindner; Gerardo Richarte

    Wiley 2011; US$ 49.99 US$ 43.99

    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable"... more...

  • Cryptology Unlockedby Reinhard Wobst; Angelika Shafir

    Wiley 2007; US$ 50.00 US$ 45.00

    Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards... more...

  • Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Securityby T. Bradley

    Elsevier Science 2006; US$ 31.95

    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a... more...

  • Geekonomicsby David Rice

    Pearson Education 2007; US$ 27.99

    The Real Cost of Insecure Software   •   In 1996, software defects in a Boeing 757 caused a crash that killed 70 people… •   In 2003, a software vulnerability helped cause the largest U.S. power outage in decades… •   In 2004, known software weaknesses let a hacker invade T-Mobile, capturing everything from passwords to Paris Hilton’s photos…... more...

  • CISO Leadershipby Todd Fitzgerald; Micki Krause

    CRC Press 2007; US$ 92.95

    Caught in the crosshairs of “Leadership” and “Information Technology”, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication,... more...

  • Understanding Windows CardSpaceby Vittorio Bertocci; Garrett Serack; Caleb Baker

    Pearson Education 2007; US$ 39.99

    Wi>Understanding Windows CardSpace is the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled experience earned by working with the CardSpace product team and by implementing state-of-the-art CardSpace-based systems at leading enterprises,... more...

  • Digital Watermarking and Steganographyby Ingemar Cox; Matthew Miller; Jeffrey Bloom; Jessica Fridrich; Ton Kalker

    Elsevier Science 2007; US$ 96.95

    Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties... more...