The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guideby James M. Stewart; Mike Chapple; Darril Gibson

    Wiley 2015; US$ 70.00

    CISSP Study Guide -  fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the... more...

  • A Cryptography Primerby Philip N. Klein

    Cambridge University Press 2014; US$ 28.00

    This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs. more...

  • Steal This Computer Book 4.0by Wallace Wang

    No Starch Press 2006; US$ 3.95

    This offbeat, nontechnical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P filesharing networks, and how people manipulate... more...

  • Mathematics of Public Key Cryptographyby Steven D. Galbraith

    Cambridge University Press 2012; US$ 60.00

    This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography. more...

  • Official (ISC)2® Guide to the ISSAP® CBK, Second Editionby (ISC)² Corporate

    CRC Press 2013; US$ 87.95

    Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK,... more...

  • Security Risk Managementby Evan Wheeler

    Elsevier Science 2011; US$ 49.95

    The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can?t explain why. This book... more...

  • Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Editionby Joseph Steinberg

    CRC Press 2015; US$ 83.95

    The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP ® ) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the ISSMP need to demonstrate a thorough understanding... more...

  • Hacking For Dummiesby Kevin Beaver; Stuart McClure

    Wiley 2004; US$ 24.99 US$ 19.99

    While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to... more...

  • Verification of Infinite-State Systems with Applications to Securityby E. Clarke; M. Minea; F.L. Tiplea

    IOS Press 2006; US$ 168.00

    The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point... more...

  • Trust Managementby Sandro Etalle; Stephen Marsh

    Springer US 2007; US$ 159.00

    This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology... more...