The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Computational Intelligence in Information Assurance and Securityby Ajith Abraham

    Springer Berlin Heidelberg 2007; US$ 179.00

    This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. It details current research on information assurance and security regarding both the theoretical and methodological aspects, as well as... more...

  • Digital Privacyby Alessandro Acquisti; Stefanos Gritzalis; Costos Lambrinoudakis; Sabrina di Vimercati

    CRC Press 2007; US$ 94.95

    While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental... more...

  • Metasploit Penetration Testing Cookbookby Monika Agarwal

    Packt Publishing 2013; US$ 29.99

    This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework... more...

  • Managing and Mining Sensor Databy Charu C. Aggarwal

    Springer US 2013; Not Available

    Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and  have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor... more...

  • Managing and Mining Uncertain Databy Charu C. Aggarwal

    Springer US 2010; Not Available

    This collection of surveys presents the most recent models, algorithms and applications in mining uncertain data. Organized to make it more accessible to applications-driven practitioners, it includes case studies based on real-world examples. more...

  • Privacy-Preserving Data Miningby Charu C. Aggarwal; Philip S. Yu

    Springer US 2008; Not Available

    This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information included with each chapter is unique in terms of its focus on introducing the different topics more comprehensively. more...

  • Emerging Trends in ICT Securityby Babak Akhgar; Hamid R. Arabnia

    Elsevier Science 2013; US$ 127.95

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application... more...

  • Automated Firewall Analyticsby Ehab Al-Shaer

    Springer International Publishing 2014; US$ 109.00

    This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing... more...

  • Kali Linux Wireless Penetration Testing Essentialsby Marco Alamanni

    Packt Publishing 2015; US$ 27.99

    This book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended. more...

  • The Browser Hacker's Handbookby Wade Alcorn; Christian Frichot; Michele Orru

    Wiley 2014; US$ 55.00

    Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on... more...