Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Security eBooks

If you like Security eBooks, then you'll love these top picks.
Showing 1 - 24 of 1920 Results
Skip side bar filters
  • Building Internet Firewalls

    Internet and Web Security

    In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated ... Read more

    $34.99 USD

  • Database Nation

    The Death of Privacy in the 21st Century

    Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to ... Read more

    $10.99 USD

  • Web Security, Privacy & Commerce

    Security for Users, Administrators and ISPs

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & ... Read more

    $28.99 USD

  • The Food Service Professional Guide to Controlling Restaurant & Food Service Labor Costs

    by Sharon Fullen ...
    This series of 15 books - The Food Service Professional Guide To Series -from the editors of Food Service Professional magazine are the best and most comprehensive books for serious food service operators available today. These step-by-step guides are invaluable. The information is boiled down to the essence and covers all the bases. ... Read more

    $17.99 USD

  • RADIUS

    Securing Public Access to Private Resources

    The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a ... Read more

    $20.99 USD

  • Programming .NET Security

    Writing Secure Applications Using C# or Visual Basic .NET

    With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in ... Read more

    $28.99 USD

  • Secure Programming Cookbook for C and C++

    Recipes for Cryptography, Authentication, Input Validation & More

    Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is ... Read more

    $43.99 USD

  • Network Security Assessment

    Know Your Network

    by Chris McNab ...
    There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new ... Read more

    $20.99 USD

  • Managing Security with Snort & IDS Tools

    Intrusion Detection with Open Source Tools

    Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before ... Read more

    $23.99 USD

  • Real World Web Services

    Integrating EBay, Google, Amazon, FedEx and more

    by Will Iverson ...
    The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those are the answers Real World Web Services delivers. ... Read more

    $28.99 USD

  • Mastering FreeBSD and OpenBSD Security

    Building, Securing, and Maintaining BSD Systems

    FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of ... Read more

    $30.99 USD

  • Snort Cookbook

    Solutions and Examples for Snort Administrators

    If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the ... Read more

    $24.99 USD

  • Network Security Tools

    Writing, Hacking, and Modifying Security Tools

    If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a ... Read more

    $20.99 USD

  • Silence on the Wire

    A Field Guide to Passive Reconnaissance and Indirect Attacks

    Author Michal Zalewski has long been known and respected in the hacking and security communities for his intelligence, curiosity and creativity, and this book is truly unlike anything else out there. In Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks, Zalewski shares his expertise and experience to explain how computers and networks work, how information is ... Read more

    $23.99 USD

  • Digital Identity

    Unmasking Identity Management Architecture (IMA)

    The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the ... Read more

    $20.99 USD

  • Internet Forensics

    Using Digital Evidence to Solve Computer Crime

    by Robert Jones ...
    Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it.This practical guide to defending against ... Read more

    $23.99 USD

  • Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses

    A Step-by-Step Guide to Computer Attacks and Effective Defenses

    “I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!”—Stephen Northcutt, CEO, SANS ... Read more

    $45.99 USD

  • Steal This Computer Book 4.0

    What They Won't Tell You About the Internet

    by Wallace Wang ...
    If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they ... Read more

    $17.99 USD

  • IPSec Virtual Private Network Fundamentals

    An introduction to designing and configuring Cisco IPsec VPNsUnderstand the basics of the IPsec protocol and learn implementation best practicesStudy up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplaceLearn how to avoid common pitfalls related to IPsec deploymentReinforce theory with case studies, configuration examples showing how IPsec maps to ... Read more

    $47.99 USD

  • The Internet: The Missing Manual

    The Missing Manual

    The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?This utterly current book covers:Ideal for anyone just venturing into cyberspace, this book is also perfect for more ... Read more

    $14.99 USD

  • HTML & XHTML: The Definitive Guide

    The Definitive Guide

    "...lucid, in-depth descriptions of the behavior of every HTML tag on every major browser and platform, plus enough dry humor to make the book a pleasure to read."--Edward Mendelson, PC Magazine"When they say 'definitive' they're not kidding."--Linda Roeder, About.comPut everthing you need to know about HTML & XHTML at your fingertips. For nearly a decade, hundreds of thousands of web developers ... Read more

    $28.99 USD

  • Network Security Hacks

    Tips & Tools for Protecting Your Privacy

    In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers ... Read more

    $23.99 USD

  • Security Metrics

    The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security OperationsSecurity Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based ... Read more

    $39.99 USD

  • A+, Network+, Security+ Exams in a Nutshell

    A Desktop Quick Reference

    If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization.As with other O'Reilly Nutshell books for ... Read more

    $31.99 USD