The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Drugs on the Dark Netby James Martin

    Palgrave Macmillan 2014; US$ 45.00

    This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptomarkets can be found thriving on the dark net. Martin explores how these websites defy powerful law enforcement agencies and represent the new digital front in the 'war on drugs'. more...

  • Cloud Security and Privacyby Tim Mather; Subra Kumaraswamy; Shahed Latif

    O'Reilly Media 2009; US$ 27.99

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...

  • Network Securityby Tansu Alpcan; Tamer Basar

    Cambridge University Press 2010; US$ 100.00

    Applies quantitative models derived from decision, control and game theories to understanding diverse network security problems. more...

  • Design for Hackersby David Kadavy

    Wiley 2011; US$ 39.99

    Discover the techniques behind beautiful design?by deconstructing designs to understand them The term 'hacker' has been redefined to consist of anyone who has an insatiable curiosity as to how things work—and how they can try to make them better. This book is aimed at hackers of all skill levels and explains the classical principles and techniques... more...

  • Security and Game Theoryby Milind Tambe

    Cambridge University Press 2011; US$ 59.00

    This study describes deployed applications of game theory for security for the LAX police and US Federal Air Marshals Service. more...

  • The Digital Personby Daniel J Solove

    NYU Press 2004; US$ 89.00

    Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences... more...

  • CompTIA Cloud+ Certification Study Guide (Exam CV0-001)by Nate Stammer; Scott Wilson

    McGraw-Hill Education 2013; US$ 50.00

    The best fully integrated study system available for the CompTIA Cloud+ Certification exam With hundreds of practice questions, CompTIA Cloud+ Certification Study Guide covers what you need to know?and shows you how to prepare?for this challenging exam. McGraw-Hill Professional is a Gold-Level CompTIA Authorized Partner offering Authorized CompTIA... more...

  • Database Nationby Simson Garfinkel

    O'Reilly Media 2000; US$ 13.99

    Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these... more...

  • Internet Security You Can Affordby Christopher Dawson

    Cengage Learning PTR 2014; US$ 39.99

    Discover one of the most efficient, effective, and inexpensive ways to stop Internet threats and protect your organization or home from malware and objectionable content with Internet Security You Can Afford: The Untangle® Internet Gateway. This book by educator and well-known ZDnet technology expert Chris Dawson demonstrates how you can establish... more...

  • Hardware Securityby Debdeep Mukhopadhyay; Rajat Subhra Chakraborty

    Taylor and Francis 2014; US$ 89.95

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very... more...