The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Soft Errorsby Jean-Luc Autran; Daniela Munteanu

    CRC Press 2015; US$ 159.95

    Soft errors are a multifaceted issue at the crossroads of applied physics and engineering sciences. Soft errors are by nature multiscale and multiphysics problems that combine not only nuclear and semiconductor physics, material sciences, circuit design, and chip architecture and operation, but also cosmic-ray physics, natural radioactivity issues,... more...

  • Cyber Warfare: A Reference Handbookby Paul Springer

    ABC-CLIO 2015; US$ 58.00

    This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. more...

  • Modeling, Evaluating, and Predicting IT Human Resources Performanceby Konstantina Richter; Reiner R. Dumke

    CRC Press 2015; US$ 119.95

    Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology (IT) personnel. However, most methods neglect to account for the rigorous application and evaluation of human errors and their associated risks. This book fills that need. Modeling, Evaluating, and Predicting IT Human... more...

  • Security Issues in Mobile NFC Devicesby Michael Roland

    Springer International Publishing 2015; US$ 119.00

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with... more...

  • Mastering Wireless Penetration Testing for Highly Secured Environmentsby Aaron Johns

    Packt Publishing 2015; US$ 26.99

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking. more...

  • Understanding Network Hacksby Bastian Ballmann

    Springer Berlin Heidelberg 2015; US$ 49.99

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader... more...

  • Fundamentals of Sketch-Based Passwordsby Benjamin S. Riggan; Wesley E. Snyder; Cliff Wang

    Springer International Publishing 2015; US$ 54.99

    This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability... more...

  • The State of the Art in Intrusion Prevention and Detectionby Al-Sakib Khan Pathan

    CRC Press 2015; US$ 119.95

    The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting... more...

  • Ethical Hacking and Penetration Testing Guideby Rafay Baloch

    CRC Press 2015; US$ 59.95

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...

  • Case Studies in Secure Computingby Biju Issac; Nauman Israr

    CRC Press 2015; US$ 119.95

    In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...