The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Wiley 2015; US$ 40.00
PRAISE FOR BEYOND CYBERSECURITY "As all companies become digital companies, it will be increasingly important to understand the risks and opportunities of an interconnected world. Protecting your digital assets is no longer a technical conversation alone, but one that should involve the Board and senior executives. The successful companies will... more...
- dpunkt.verlag 2015; US$ 35.16
Metasploit ist ein Penetration-Testing-Werkzeug, das in der Toolbox eines jeden Pentesters zu finden ist. Dieses Buch stellt das Framework detailliert vor und zeigt, wie Sie es im Rahmen unterschiedlichster Penetrationstests einsetzen. more...
- Elsevier Science 2015; US$ 120.00
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital... more...
- Packt Publishing 2015; US$ 39.99
If you are a technical professional who wants to dive deeper into the functionality offered by AirWatch or manage the solution, then this book will help you choose the best set of configuration, device management, and monitoring options that you can use to effectively manage your EMM implementation. more...
- Wiley 2015; US$ 29.99
Launch Your Career in Computer Forensics?Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data ... more...
- CRC Press 2015; US$ 159.95
" Soft Errors: From Particles to Circuits covers all aspects of the design, use, application, performance, and testing of parts, devices, and systems and addresses every perspective from an engineering, scientific, or physical point of view. ? Many good texts have been written on similar subjects, but none as thorough, as clear, and as complete as... more...
- Springer International Publishing 2015; US$ 119.00
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with... more...
- CRC Press 2015; US$ 119.95
Introduction Motivation Structure of the Book References Software Risk Management and Human Factors Overview of Risk Management Development Incompleteness of Risk Assessment Methods Risk Management Summary and Further Research Motivation Human Factors in Software Engineering Summary of Human Factors References Software Engineering, Team, and... more...
- Packt Publishing 2015; US$ 26.99
This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking. more...