The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Statistical Methods in Computer Securityby

    Taylor and Francis 2004; US$ 146.95

    Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct... more...

  • Digital Privacyby Alessandro Acquisti; Stefanos Gritzalis; Costos Lambrinoudakis; Sabrina di Vimercati

    Taylor and Francis 2007; US$ 91.95

    While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental... more...

  • Metasploit Penetration Testing Cookbookby Monika Agarwal

    Packt Publishing 2013; US$ 29.99

    This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick.This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework... more...

  • Managing and Mining Sensor Databy Charu C. Aggarwal

    Springer 2013; US$ 149.00

    Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and  have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining... more...

  • Emerging Trends in ICT Securityby Babak Akhgar; Hamid R. Arabnia

    Elsevier Science 2013; US$ 129.95

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application... more...

  • The Browser Hacker's Handbookby Wade Alcorn; Christian Frichot; Michele Orru

    Wiley 2014; US$ 55.00

    Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on... more...

  • Advanced Penetration Testing for Highly-Secured Environments The Ultimate Security Guideby Lee Allen

    Packt Publishing 2012; US$ 35.99

    Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. more...

  • Unauthorised Accessby Wil Allsopp

    Wiley 2010; US$ 45.00

    The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures,... more...

  • Surviving Securityby Amanda Andress

    Taylor and Francis 2004; US$ 104.95

    Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers... more...

  • Coding for Penetration Testersby Jason Andress; Ryan Linn

    Elsevier Science 2011; US$ 39.95

    Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of... more...