The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Die Piratenparteiby

    Springer Fachmedien Wiesbaden 2012; US$ 19.95

    Der Band bietet den Leserinnen und Lesern eine aktuelle und umfassende Bestandsaufnahme aller Aspekte, die für das Verständnis der Piratenpartei, ihrer bisherigen Erfolge und ihrer Zukunftsaussichten wichtig sind. Man erhält Einblick in die internationale Vorgeschichte und Gründung der Piratenpartei Deutschlands, ihr Werdegang bis zum Frühjahr 2012... more...

  • Introduction to Hardware Security and Trustby

    Springer New York 2011; US$ 179.00

    Provides a comprehensive introduction to hardware security and trust Includes coverage at the circuit and systems levels, with applications to design and implementation Describes a variety of state-of-the-art applications, such as physically unclonable functions, unclonable RFID tags and attach and countermeasures for smart cards. more...

  • Managing and Mining Sensor Databy

    Springer US 2013; US$ 149.00

    Structured as a set of survey chapters, the book provides easy access to the material from a vast area in one place Cross-disciplinary approach with topics related to both data-centric and sensor-centric aspects Topics include: Stream Management Systems, Event Processing in Sensor Streams, Multimedia Sensor Mining, Social Sensing, Sensing for Mobile... more...

  • Economics of Information Security and Privacy IIIby

    Springer New York 2012; US$ 199.00

    The Impact of Immediate Disclosure on Attack Diffusion and Volume.- Where Do All the Attacks Go?.- Sex, Lies and Cyber-Crime Surveys.- The Underground Economy of Fake Antivirus Software.- The Inconvenient Truth about Web Certificates.- Resilience of the Internet Interconnection Ecosystem.- Modeling Internet-Scale Policies for Cleaning up Malware.-... more...

  • Security and Privacy in Biometricsby

    Springer London 2013; US$ 129.00

    Provides an overview of the most recent privacy-enhancing techniques for biometric-based recognition systems Presents real-world applications of biometric-based recognition systems Covers ethical, legal, and procedural aspects more...

  • Cyberterrorismby

    Springer New York 2014; US$ 109.00

    Presents a multidisciplinary approach to cyber-terrorism Evaluates the adequacy of current practical approaches to deter, identify, and respond to cyber-terrorist attacks Includes a glossary of key terms, graphic illustrations of cyber-terrorist threats, attacks, case studies and a brief guide to further reading and resources more...

  • Socio-technical Design of Ubiquitous Computing Systemsby

    Springer International Publishing 2014; US$ 129.00

    Presents a comprehensive blueprint for systematic, interdisciplinary software development for ubiquitous computing systems Uniquely combines findings from computer science, information systems, human-computer interaction and law Takes into account technical, legal, and social aspects of system development more...

  • Digital Privacyby Alessandro Acquisti; Stefanos Gritzalis; Costos Lambrinoudakis; Sabrina di Vimercati

    CRC Press 2007; US$ 94.95

    THE PRIVACY SPACE Privacy Enhancing Technologies for the Internet III: Ten Years Later, I. Goldberg Communication Privacy, A. Pfitzmann, A. Juschka, A.-K. Stange, S. Steinbrecher, and S. Köpsell, and Privacy-Preserving Cryptographic Protocols, M.J. Atallah and K.B. Frikken PRIVACY ATTACKS Byzantine Attacks on Anonymity Systems, ... more...

  • Metasploit Penetration Testing Cookbookby Monika Agarwal

    Packt Publishing 2013; US$ 29.99

    This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework... more...

  • Emerging Trends in ICT Securityby Babak Akhgar; Hamid R. Arabnia

    Elsevier Science 2013; US$ 129.95

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application... more...