The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Springer International Publishing 2016; US$ 60.00
Thisbook constitutes the refereed post-conference proceedings of the 4thInternational Workshop on Lightweight Cryptography for Security and Privacy,LightSec 2015, held in Bochum, Germany, in September 2015. The9 full papers presented were carefully reviewed and selected from 17submissions. The papers are organized in the following topical sections:... more...
- Pearson Education 2007; US$ 55.99
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing... more...
- Springer International Publishing 2016; US$ 131.00
Thisvolume constitutes the thoroughly refereed post-conference proceedings of the11th International Conference on Security and Privacy in CommunicationNetworks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefullyreviewed and selected from 107 submissions. It also presents 9 papers... more...
- Pearson Education 2004; US$ 59.99
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers?both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP... more...
- Springer Berlin Heidelberg 2016; US$ 82.00
This, the 26th issue of the Transactions on Computational Science journal, is comprised of ten extended versions of selected papers from the International Conference on Cyberworlds 2014, held in Santander, Spain, in June 2014. The topics covered include areas of virtual reality, games, social networks, haptic modeling, cybersecurity, and applications... more...
- Springer Berlin Heidelberg 2014; US$ 107.00
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability... more...
- Wiley 2010; US$ 45.00
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures,... more...
- Elsevier Science 2004; US$ 51.95
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry.... more...
- McGraw-Hill Education 2003; US$ 54.95
By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols. * Review security approaches for the different standards currently... more...
- Pearson Education 2008; US$ 19.99
Today, if you own a Windows computer you need to understand the risks and the potential damage security threats pose. The mere act of turning on an Internet-connected computer can put you, your family, and even your personal finances at risk! This book defines all the threats an average household might face and provides strategies to turn novice... more...