The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Hardware Securityby Debdeep Mukhopadhyay; Rajat Subhra Chakraborty

    Taylor and Francis 2014; US$ 89.95

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very... more...

  • Integrated Virus Detectionby Charles H. Wick

    Taylor and Francis 2014; US$ 89.95

    Multiple viruses can be detected concurrently using the Integrated Virus Detection System (IVDS). Integrated Virus Detection describes this technology and provides many examples of applications including a chapter on viruses found in honeybees with descriptions of seasonal and yearly variation. This straightforward technology can be used to detect... more...

  • Practical Cryptographyby Saiful Azad; Al-Sakib Khan Pathan

    Taylor and Francis 2014; US$ 69.95

    Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the... more...

  • Untangle Network Securityby Abd El-Monem A. El-Bawab

    Packt Publishing 2014; US$ 26.99

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using... more...

  • A Practical Guide to Security Engineering and Information Assuranceby Debra S. Herrmann

    Taylor and Francis 2014; US$ 119.95

    Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely,... more...

  • Secure Development for Mobile Appsby J. D. Glaser

    Taylor and Francis 2014; US$ 59.95

    The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software security should be of primary concern to every mobile... more...

  • Case Studies in Secure Computingby Biju Issac; Nauman Israr

    Taylor and Francis 2014; US$ 119.95

    In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...

  • Pervasive Wireless Environments: Detecting and Localizing User Spoofingby Jie Yang; Yingying Chen; Wade Trappe; Jerry Cheng

    Springer 2014; US$ 54.99

    This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors... more...

  • The News Machineby James Hanning; Glenn Mulcaire

    Gibson Square 2014; US$ 7.28

    There is one mystery figure at the heart of ‘Hackergate? – Glenn Mulcaire, the News of the World?s top private investigator. The former AFC Wimbledon footballer has never spoken publicly or in court about his work investigating and backing up front-page news stories (such as the News of the World?s award-winning David Beckham scoop). Mulcaire?s... more...

  • CEH: Certified Ethical Hacker Version 8 Study Guideby Sean-Philip Oriyano

    Wiley 2014; US$ 49.99

    Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam... more...