The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • The Accidental SysAdmin Handbookby Eric Kralicek

    Apress 2016; US$ 39.99

    Understand the concepts, processes and technologies that will aid in your professional development as a new system administrator. While every information technology culture is specific to its parent organization, there are commonalities that apply to all organizations. The Accidental SysAdmin Handbook, Second Edition looks at those commonalities... more...

  • Advances in Artificial Intelligence for Privacy Protection and Securityby Agusti Solanas; Antoni Martínez-Ballesté

    World Scientific Publishing Company 2009; US$ 89.00

    In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas, which are... more...

  • Analysis Techniques for Information Securityby Anupam Datta; Somesh Jha; Ninghui Li; David Melski

    Morgan & Claypool Publishers 2010; US$ 40.00

    Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures... more...

  • Applied Cryptanalysisby Mark Stamp; Richard M. Low

    Wiley 2007; US$ 124.00

    The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... more...

  • Applied Network Security Monitoringby Chris Sanders; Jason Smith

    Elsevier Science 2013; US$ 49.95

    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat... more...

  • Applied Public Key Infrastructureby J. Zhou; M.-C. Kang; F. Bao

    IOS Press 2005; US$ 144.00

    Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related operations... more...

  • Aus dem Tagebuch eines Bughuntersby Tobias Klein

    dpunkt.verlag 2011; US$ 25.76

    Software-Schwachstellen, Bugs, Exploits - es wird viel darüber geredet, aber kaum jemand weiß, wie man Software verlässlich auf problematische Stellen hin untersucht. Sicherheitsberater Tobias Klein kennt sich aus! Wenn Sie für die Sicherheit von Softwareprodukten zuständig sind oder selbst Software entwickeln, dann sollten Sie seine Projekttagebücher... more...

  • Basics Of Contemporary Cryptography For It Practitionersby Boris Ryabko; Andrey Fionov

    World Scientific Publishing Company 2005; US$ 74.00

    The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and... more...

  • The Basics of Information Securityby Jason Andress

    Elsevier Science 2014; US$ 34.95

    As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical... more...

  • Bent Functionsby Natalia Tokareva

    Elsevier Science 2015; US$ 74.95

    Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed... more...