The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

  • Linux Server Securityby Chris Binnie

    Wiley 2016; US$ 50.00

    Learn how to attack and defend the world’s most popular web server platform Linux Server Security  presents a detailed guide for experienced technical professionals seeking a more advanced understanding of Linux security tools and methods. Written by a 20-year veteran of Linux server deployment, this book provides... more...

  • Penetration Testing Essentialsby Sean-Philip Oriyano

    Wiley 2016; US$ 50.00

    Becoming a professional penetration tester (or pen tester or ethical hacker) can be a major step forward in an IT security career. But before one can get the most well known professional certification for ethical hackers, you need foundational knowledge and at least 2 years of versified IT experience. Before you begin a formal career and path to certification,... more...

  • Automating Junos Administrationby Jonathan Looney; Stacy Smith

    O'Reilly Media 2016; US$ 42.99

    How can you grow and maintain a reliable, flexible, and cost-efficient network in the face of ever-increasing demands? With this practical guide, network engineers will learn how to program Juniper network devices to perform day-to-day tasks, using the automation features of the Junos OS. Junos supports several automation tools that provide powerful... more...

  • The Official (ISC)2 Guide to the SSCP CBKby Gordon; Steven Hernandez

    Wiley 2016; US$ 80.00

    The fourth edition of the Official (ISC) 2 ® Guide to the SSCP CBK® is a comprehensive resource providing an in-depth look at the seven domains of the SSCP Common Body of Knowledge (CBK).  This latest edition provides an updated, detailed guide that is considered one of the best tools for candidates striving to become an SSCP.  The book offers... more...

  • The Official (ISC)2 Guide to the CCSP CBKby Gordon

    Wiley 2016; US$ 80.00

    Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC) 2  the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The   Official (ISC) 2  Guide to the CCSP SM  CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step... more...

  • CEH v9by Raymond Blockmon

    Wiley 2016; US$ 40.00

    Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and... more...

  • Passive Imaging with Ambient Noiseby Josselin Garnier; George Papanicolaou

    Cambridge University Press 2016; US$ 120.00

    This multidisciplinary book provides a systematic introduction to the analysis of passive sensor array imaging using ambient noise sources. more...

  • Verteilte Laufzeitverifikation auf eingebetteten Systemenby Malte Schmitz

    Springer Fachmedien Wiesbaden 2016; US$ 54.99

    In seiner Arbeit betrachtet Malte Schmitz, wie die Korrektheit von verteilten Systemen zur Laufzeit überwacht werden kann. Dazu untersucht und entwickelt er verschiedene Varianten der linearen Temporallogik (LTL) und zugehörige Monitorkonstruktionen für den Einsatz zur Laufzeitverifikation verteilter, asynchroner, eingebetteter Systeme. Als Fallstudie... more...

  • Enterprise Level Securityby William R. Simpson

    CRC Press 2016; US$ 69.95

    Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived... more...

  • Moving Target Defense for Distributed Systemsby Sachin Shetty; Xuebiao Yuchi; Min Song

    Springer International Publishing 2016; US$ 99.00

    This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers. These approaches include MTD-based... more...