The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Official (ISC)2 Guide to the CISSP CBK, Fourth Editionby Adam Gordon

    CRC Press 2015; US$ 79.95

    As a result of a rigorous, methodical process that (ISC)▓ follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)▓ conducts this process on a regular basis to ensure that the examinations and... more...

  • CISSP All-in-One Exam Guide, 6th Editionby Shon Harris

    McGraw-Hill Education 2012; US$ 80.00

    Chapter 1: Becoming a CISSP Chapter 2: Information Security Governance and Risk Management Chapter 3: Access Control Chapter 4: Security Architecture and Design Chapter 5: Physical and Environmental Security Chapter 6: Telecommunications and Network Security Chapter 7: Cryptography Chapter 8: Business Continuity and Disaster Recovery Planning... more...

  • Reverse Deception: Organized Cyber Threat Counter-Exploitationby Sean Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones

    McGraw-Hill Education 2012; US$ 42.00

    Ch 1. Introduction Ch 2. Deception Throughout History to Today Ch 3. The Applications & Goals of Cyber Counterintelligence Ch 4. The Missions and Outcomes of Criminal Profiling Ch 5. Legal & Ethical Aspects of Deception Ch 6. Attack Tradecraft Ch 7. Operational Deception Ch 8. Tools, Tactics & Procedures Ch 9. Attack Attribution Ch 10. Black... more...

  • Business Continuity Managementby Stuart Hotchkiss

    British Informatics Society Limited 2010; US$ 33.99

    Introduction and purpose 1 General issues in continuity management 2 In practice - the foundations 3 Business impact analysis 4 Business impact analysis report 5 Threats, risks and risk analysis 6 Supporting functions and departments 7 Scenarios 8 Procedures - the last thing to do is think 9 Testing and staying friends 10 Audit 11 Implementation... more...

  • CISSP Study Guideby Eric Conrad; Seth Misenar; Joshua Feldman

    Elsevier Science 2012; US$ 59.95

    The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals.áThe newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam?s Common Body of Knowledge. The ten domains are covered completely and as concisely as... more...

  • Bring Your Own Device (BYOD)by The Chartered Institute for IT BCS

    BCS Learning & Development Limited 2013; US$ 2.99

    BYOD: the pros and cons for end users and the business Technology innovations for today?s workspace A little chat about BYOD To BYOD or not to BYOD - that is the question User-centric technology deployment comes of age Navigating the consumerisation of the IT storm Why IT are on the front line of business management Learning from universities... more...

  • Vehicular Networkingby Christoph Sommer; Falko Dressler

    Cambridge University Press 2014; US$ 88.00

    Learn about the basics and the future of vehicular networking research with this essential guide to in- and inter-vehicle communication. more...

  • Investigating Internet Crimesby Todd G. Shipley; Art Bowker

    Elsevier Science 2013; US$ 49.95

    Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting,... more...

  • JIRA Essentialsby Patrick Li

    Packt Publishing 2015; US$ 51.99

    If you wish to develop your practical skills with JIRA in order to install, use, and manage your projects, then this is the perfect book for you. You need to be familiar with software project management and basic computer operations, specifically the system on which you will use JIRA. more...

  • Crafting the InfoSec Playbookby Jeff Bollinger; Brandon Enright; Matthew Valites

    O'Reilly Media 2015; US$ 42.99

    Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...