The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Simple Statistical Methods for Software Engineeringby C. Ravindranath Pandian; Murali Kumar

    CRC Press 2015; US$ 99.95

    Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler solutions that are just as effective and connect... more...

  • Beyond Cybersecurityby James M. Kaplan; Tucker Bailey; Derek O'Halloran; Alan Marcus; Chris Rezek

    Wiley 2015; US$ 40.00

    PRAISE FOR BEYOND CYBERSECURITY "As all companies become digital companies, it will be increasingly important to understand the risks and opportunities of an interconnected world. Protecting your digital assets is no longer a technical conversation alone, but one that should involve the Board and senior executives. The successful companies will... more...

  • Hacking mit Metasploitby Michael Messner

    dpunkt.verlag 2015; US$ 36.25

    Metasploit ist ein Penetration-Testing-Werkzeug, das in der Toolbox eines jeden Pentesters zu finden ist. Dieses Buch stellt das Framework detailliert vor und zeigt, wie Sie es im Rahmen unterschiedlichster Penetrationstests einsetzen. more...

  • Digital Identity Managementby Maryline Laurent; Samia Bouzefrane

    Elsevier Science 2015; US$ 120.00

    In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital... more...

  • Learning AirWatchby Mark Dunkerley

    Packt Publishing 2015; US$ 39.99

    If you are a technical professional who wants to dive deeper into the functionality offered by AirWatch or manage the solution, then this book will help you choose the best set of configuration, device management, and monitoring options that you can use to effectively manage your EMM implementation. more...

  • Computer Forensics JumpStartby Micah Solomon; Diane Barrett; Neil Broom

    Wiley 2015; US$ 29.99

    Launch Your Career in Computer Forensics?Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data ... more...

  • Cyber Warfareby Paul Springer

    ABC-CLIO 2015; US$ 58.00

    More than a million cyber attacks are attempted on the U.S. infrastructure daily. more...

  • Soft Errorsby Jean-Luc Autran; Daniela Munteanu

    CRC Press 2015; US$ 159.95

    " Soft Errors: From Particles to Circuits covers all aspects of the design, use, application, performance, and testing of parts, devices, and systems and addresses every perspective from an engineering, scientific, or physical point of view. ? Many good texts have been written on similar subjects, but none as thorough, as clear, and as complete as... more...

  • Security Issues in Mobile NFC Devicesby Michael Roland

    Springer International Publishing 2015; US$ 119.00

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with... more...

  • Modeling, Evaluating, and Predicting IT Human Resources Performanceby Konstantina Richter; Reiner R. Dumke

    CRC Press 2015; US$ 119.95

    Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology (IT) personnel. However, most methods neglect to account for the rigorous application and evaluation of human errors and their associated risks. This book fills that need. Modeling, Evaluating, and Predicting IT Human... more...