The Leading eBooks Store Online

3,725,826 members ⚫ 1,209,635 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Information Securityby Timothy P. Layton

    CRC Press 2016; US$ 121.95

    Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately,... more...

  • Cyber Security Essentialsby James Graham; Ryan Olson; Rick Howard

    CRC Press 2016; US$ 72.95

    The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish... more...

  • Computer Security Literacyby Douglas Jacobson; Joseph Idziorek

    CRC Press 2016; US$ 57.95

    Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform ( or do not perform ). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical... more...

  • Information Security Policy Development for Complianceby Barry L. Williams

    CRC Press 2016; US$ 59.95

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies... more...

  • Secret Historyby Craig P. Bauer

    CRC Press 2016; US$ 83.95

    Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites,... more...

  • Security and Policy Driven Computingby Lei Liu

    CRC Press 2016; US$ 99.95

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and... more...

  • Introduction to Cryptography with Open-Source Softwareby Alasdair McAndrew

    CRC Press 2016; US$ 90.95

    Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience... more...

  • Information Security Policies, Procedures, and Standardsby Thomas R. Peltier

    CRC Press 2016; US$ 104.95

    By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures,... more...

  • Data Privacy Management, and Security Assuranceby Joaquin Garcia-Alfaro; Guillermo Navarro-Arribas; Alessandro Aldini; Fabio Martinelli; Neeraj Suri

    Springer International Publishing 2016; US$ 105.72

    This book constitutes the revised selected papers of the10th International Workshop on Data Privacy Management, DPM 2015, and the 4thInternational Workshop on Quantitative Aspects in Security Assurance, QASA2015, held in Vienna, Austria, in September 2015, co-located with the 20thEuropean Symposium on Research in Computer Security, ESORICS 2015. ... more...

  • Public-Key Cryptography ? PKC 2016by Chen-Mou Cheng; Kai-Min Chung; Giuseppe Persiano; Bo-Yin Yang

    Springer Berlin Heidelberg 2016; US$ 60.26

    Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named:... more...