The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- CRC Press 2005; US$ 89.95
The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts... more...
- Cambridge University Press 2004; US$ 52.00
A rigorous treatment of Encryption, Signatures, and General Cryptographic Protocols, emphasizing fundamental concepts. more...
- Cambridge University Press 2001; US$ 52.00
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. more...
- Van Haren Publishing 2011; US$ 45.00
Information Security professionals today have to be able to demonstrate their security strategies within clearly demonstrable frameworks, and show how these are driven by their organization's business priorities, derived from sound risk management assessments. This Open Enterprise Security Architecture (O-ESA) Guide provides a valuable reference resource... more...
- Wiley 2008; US$ 50.00
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers,... more...
- Wiley 2015; US$ 50.00
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through... more...
- Wiley 2004; US$ 24.99 US$ 19.99
While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to... more...
- IOS Press 2006; US$ 168.00
The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point... more...
- Springer 2007; US$ 64.95
This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword... more...
- IT Governance Publishing 2008; US$ 14.95
This new pocket guide will suit both individuals who need an introduction to a topic that they know little about, and also organizations implementing, or considering implementing, some sort of information security management regime, particularly if using ISO/IEC 27001:2005 more...