The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guideby James M. Stewart; Mike Chapple; Darril Gibson

    Wiley 2015; US$ 70.00

    CISSP Study Guide -  fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the... more...

  • The Basics of Cyber Warfareby Steve Winterfeld; Jason Andress

    Elsevier Science 2012; US$ 29.95

    The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack... more...

  • Secure Multiparty Computation and Secret Sharingby Ronald Cramer; Ivan Bjerre Damgård; Jesper Buus Nielsen

    Cambridge University Press 2015; US$ 64.00

    This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts. more...

  • Cryptography Engineeringby Niels Ferguson; Bruce Schneier; Tadayoshi Kohno

    Wiley 2011; US$ 55.00

    The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major... more...

  • Digital Forensics for Network, Internet, and Cloud Computingby Clint P Garrison

    Elsevier Science 2010; US$ 72.95

    Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists... more...

  • Business Continuity Planningby Ken Doughty

    CRC Press 2000; US$ 132.95

    Once considered a luxury, a business continuity plan has become a necessity. Many companies are required to have one by law. Others have implemented them to protect themselves from liability, and some have adopted them after a disaster or after a near miss. Whatever your reason, the right continuity plan is essential to your organization. Business... more...

  • The Frugal CISOby Kerry Ann Anderson

    CRC Press 2014; US$ 49.95

    If you?re an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO : Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put... more...

  • Instant Kali Linuxby Abhinav Singh

    Packt Publishing 2013; US$ 12.99

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A quick and handy guide for those who are willing to get straight into the business. This book will build a strong foundation for those who are willing to cover different security assessment areas by... more...

  • Windows Registry Forensicsby Harlan Carvey

    Elsevier Science 2011; US$ 68.95

    Harlan Carvey brings readers an advanced book on Windows Registry. The first book of its kind EVER -- Windows Registry Forensics provides the background of the Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis... more...

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity. It provides recommendations on aligning a security programme with wider... more...