The Leading eBooks Store Online

3,572,933 members ⚫ 1,183,089 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guideby James M. Stewart; Mike Chapple; Darril Gibson

    Wiley 2015; US$ 70.00 US$ 49.00

    CISSP Study Guide -  fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the... more...

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 85.00 US$ 73.67

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems... more...

  • Social Media Securityby Michael Cross

    Elsevier Science 2013; US$ 49.95

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...

  • Countdown to Zero Dayby Kim Zetter

    Crown/Archetype 2014; US$ 16.00

    Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran?s nuclear efforts and shows how its existence has ushered in a new age of warfare?one in which a digital attack can have the same destructive capability as a megaton bomb.   In January 2010, inspectors with the International Atomic Energy Agency noticed... more...

  • The Snowden Filesby Luke Harding

    Guardian Faber Publishing 2014; US$ 9.99

    It began with an unsigned email: "I am a senior member of the intelligence community". What followed was the most spectacular intelligence breach ever, brought about by one extraordinary man, Edward Snowden. The consequences have shaken the leaders of nations worldwide, from Obama to Cameron, to the presidents of Brazil, France, and Indonesia, and... more...

  • The Computing Universeby Tony Hey; Gyuri Pápay

    Cambridge University Press 2014; US$ 32.00 US$ 26.24

    This exciting and accessible book takes us on a journey from the early days of computers to the cutting-edge research of the present day. more...

  • Computer and Information Security Handbookby John R. Vacca

    Elsevier Science 2012; US$ 127.95

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security... more...

  • Hacking For Dummiesby Kevin Beaver; Stuart McClure

    Wiley 2004; US$ 24.99 US$ 19.99

    While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to... more...

  • Verification of Infinite-State Systems with Applications to Securityby E. Clarke; M. Minea; F.L. Tiplea

    IOS Press 2006; US$ 168.00

    The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point... more...

  • Trust Managementby Sandro Etalle; Stephen Marsh

    Springer US 2007; US$ 159.00

    This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology... more...