The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Soft Errorsby Jean-Luc Autran; Daniela Munteanu

    Taylor and Francis 2015; US$ 159.95

    This book addresses soft errors in digital integrated circuits subjected to the terrestrial natural radiation environment. It details the physical mechanisms at the origin of soft errors and explains how to detect, characterize, and simulate these phenomena in electronic circuits. It offers a practical knowledge and state-of-the-art survey of instrumentation... more...

  • Cyber Warfare: A Reference Handbookby Paul Springer

    ABC-CLIO 2015; US$ 58.00

    This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. more...

  • Modeling, Evaluating, and Predicting IT Human Resources Performanceby Konstantina Richter; Reiner R. Dumke

    Taylor and Francis 2015; US$ 119.95

    This book addresses well-established methodologies and development levels like CMMI level five or the agile software development approach depends on a fundamental knowledge and management of human factors. It emphasizes considering people as a factor responsible for different risks in the software engineering process and in this way influencing the... more...

  • Mastering Wireless Penetration Testing for Highly Secured Environmentsby Aaron Johns

    Packt Publishing 2015; US$ 26.99

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking. more...

  • Understanding Network Hacksby Bastian Ballmann

    Springer Berlin Heidelberg 2015; US$ 0.00

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader... more...

  • Fundamentals of Sketch-Based Passwordsby Benjamin S. Riggan; Wesley E. Snyder; Cliff Wang

    Springer International Publishing 2015; US$ 0.00

    This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability... more...

  • The State of the Art in Intrusion Prevention and Detectionby Al-Sakib Khan Pathan

    CRC Press 2015; US$ 119.95

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting... more...

  • Ethical Hacking and Penetration Testing Guideby Rafay Baloch

    CRC Press 2015; US$ 59.95

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...

  • Case Studies in Secure Computingby Biju Issac; Nauman Israr

    CRC Press 2015; US$ 119.95

    In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...

  • Hardware Securityby Debdeep Mukhopadhyay; Rajat Subhra Chakraborty

    CRC Press 2015; US$ 89.95

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very... more...