The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Simple Statistical Methods for Software Engineeringby C. Ravindranath Pandian; Murali Kumar

    CRC Press 2015; US$ 99.95

    Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler solutions that are just as effective and connect... more...

  • Beyond Cybersecurityby James M. Kaplan; Tucker Bailey; Derek O'Halloran; Alan Marcus; Chris Rezek

    Wiley 2015; US$ 40.00

    PRAISE FOR BEYOND CYBERSECURITY "As all companies become digital companies, it will be increasingly important to understand the risks and opportunities of an interconnected world. Protecting your digital assets is no longer a technical conversation alone, but one that should involve the Board and senior executives. The successful companies will... more...

  • Hacking mit Metasploitby Michael Messner

    dpunkt.verlag 2015; US$ 36.25

    Metasploit ist ein Penetration-Testing-Werkzeug, das in der Toolbox eines jeden Pentesters zu finden ist. Dieses Buch stellt das Framework detailliert vor und zeigt, wie Sie es im Rahmen unterschiedlichster Penetrationstests einsetzen. more...

  • Digital Identity Managementby Maryline Laurent; Samia Bouzefrane

    Elsevier Science 2015; US$ 120.00

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital... more...

  • Learning AirWatchby Mark Dunkerley

    Packt Publishing 2015; US$ 39.99

    If you are a technical professional who wants to dive deeper into the functionality offered by AirWatch or manage the solution, then this book will help you choose the best set of configuration, device management, and monitoring options that you can use to effectively manage your EMM implementation. more...

  • Computer Forensics JumpStartby Micah Solomon; Diane Barrett; Neil Broom

    Wiley 2015; US$ 29.99

    Launch Your Career in Computer Forensics?Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data ... more...

  • Sicherheit von Webanwendungen in der Praxisby Matthias Rohr

    Springer Fachmedien Wiesbaden 2015; US$ 59.99

    Dieses Buch beleuchtet die wichtigsten Aspekte der Webanwendungssicherheit. Neben den Hintergründen werden Best Practices für Entwicklung, Betrieb sowie Qualitätssicherung vorgestellt. Der Autor erläutert zudem, wie sich die Sicherheit in selbst entwickelten und zugekauften Webanwendungen durch organisatorische Prozesse nachhaltig verbessern lässt.... more...

  • Cyber Warfareby Paul Springer

    ABC-CLIO 2015; US$ 58.00

    More than a million cyber attacks are attempted on the U.S. infrastructure daily. more...

  • Soft Errorsby Jean-Luc Autran; Daniela Munteanu

    CRC Press 2015; US$ 159.95

    Soft errors are a multifaceted issue at the crossroads of applied physics and engineering sciences. Soft errors are by nature multiscale and multiphysics problems that combine not only nuclear and semiconductor physics, material sciences, circuit design, and chip architecture and operation, but also cosmic-ray physics, natural radioactivity issues,... more...

  • Security Issues in Mobile NFC Devicesby Michael Roland

    Springer International Publishing 2015; US$ 119.00

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with... more...