The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Network Security Through Data Analysisby Michael S Collins

    O'Reilly Media 2014; US$ 42.99

    Traditional intrusion detection and logfile analysis are no longer enough to protect today?s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You?ll understand how your network is used, and what actions are necessary to protect... more...

  • A Cryptography Primerby Philip N. Klein

    Cambridge University Press 2014; US$ 26.00

    This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs. more...

  • Official (ISC)2 Guide to the CISSP CBK, Fourth Editionby Adam Gordon

    Taylor and Francis 2015; US$ 79.95

    This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC) authorized instructors who are highly knowledgeable about the latest information security-related developments and are proven experts in the CISSP common body of knowledge (CBK). Endorsed by the (ISC), the Official (ISC) 2 Guide to the CISSP ... more...

  • Biometrics in the New Worldby Julian Ashbourn

    Springer 2014; US$ 69.99

    This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held... more...

  • Security and the Networked Societyby Mark Gregory; David Glance

    Springer 2013; US$ 129.00

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information... more...

  • QC-LDPC Code-Based Cryptographyby Marco Baldi

    Springer 2014; US$ 54.99

    This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several... more...

  • Internet Security You Can Affordby Christopher Dawson

    Cengage Learning PTR 2014; US$ 39.99

    Discover one of the most efficient, effective, and inexpensive ways to stop Internet threats and protect your organization or home from malware and objectionable content with Internet Security You Can Afford: The Untangle® Internet Gateway. This book by educator and well-known ZDnet technology expert Chris Dawson demonstrates how you can establish... more...

  • Applied Computation and Security Systemsby Rituparna Chaki; Khalid Saeed; Sankhayan Choudhury; Nabendu Chaki

    Springer 2014; US$ 129.00

    This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and... more...

  • Introduction to Certificateless Cryptographyby Hu Xiong

    Taylor and Francis 2015; US$ 89.95

    As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing... more...

  • CompTIA Security+ SY0-401 In Depthby Mark Ciampa

    Cengage Learning PTR 2014; US$ 50.00

    Comptia Security+ Sy0-401 in Depth Will Prepare You to Pass Comptia’S New Security+ Certification Exam and Earn This Important Credential in the Field of Computer Security. This Book Offers In-Depth Coverage of All Relevant Topics, from Handling Malware to Advanced Cryptography, Wireless and Mobile Security, and Much More. Using the Proven in... more...