The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CompTIA Security+ SY0-301 Practice Questions Exam Cramby Diane Barrett

    Pearson Education 2011; US$ 27.99

    CompTIAŽ Security+ SY0-301 Practice Questions Exam Cram , Third Edition, offers all the exam practice you?ll need to systematically prepare, identify and fix areas of weakness, and pass your exam the first time. This book complements any Security+ study plan with more than 800 practice test questions?all supported with complete explanations... more...

  • CompTIA Security+ SY0-401 In Depthby Mark Ciampa

    Cengage Learning PTR 2014; US$ 50.00

    Comptia Security+ Sy0-401 in Depth Will Prepare You to Pass Comptia’S New Security+ Certification Exam and Earn This Important Credential in the Field of Computer Security. This Book Offers In-Depth Coverage of All Relevant Topics, from Handling Malware to Advanced Cryptography, Wireless and Mobile Security, and Much More. Using the Proven in... more...

  • Computational Algorithms for Fingerprint Recognitionby Bir Bhanu; Xuejun Tan

    Springer US 2012; US$ 199.00

    Biometrics such as fingerprint, face, gait, iris, voice and signature, recognizes one's identity using his/her physiological or behavioral characteristics. Among these biometric signs, fingerprint has been researched the longest period of time, and shows the most promising future in real-world applications. However, because of the complex distortions... more...

  • The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Riskby N.K. McCarthy; Matthew Todd; Jeff Klaben

    McGraw-Hill Education 2012; US$ 60.00

    Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...

  • Computer Networks and Distributed Systemsby Amir Hossein Jahangir; Ali Movaghar; Hossein Asadi

    Springer International Publishing 2014; US$ 84.00

    This book constitutes the refereed proceedings of the International Symposium on Computer Networks and Distributed Systems, CNDS 2013, held in Tehran, Iran, in December 2013. The 14 full papers presented were carefully reviewed and selected from numerous submissions. They are organized in topical sections such as cognitive and multimedia networks;... more...

  • A Cryptography Primerby Philip N. Klein

    Cambridge University Press 2014; US$ 28.00

    This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs. more...

  • Cyber Denial, Deception and Counter Deceptionby Kristin E. Heckman; Frank J. Stech; Roshan K. Thomas; Ben Schmoker; Alexander W. Tsow

    Springer International Publishing 2015; US$ 109.00

    This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of... more...

  • Cyber Security and IT Infrastructure Protectionby John R. Vacca

    Elsevier Science 2013; US$ 49.95

    This book serves as a security practitioner?s guide to today?s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure... more...

  • Cyber Threatby Chris Bronk

    ABC-CLIO 2016; US$ 75.00

    How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security,... more...

  • Cyber Warfareby Sanjeev Relia

    Vij Books India Private Limited 2016; US$ 45.00

    This book is an attempt to understand various nuances of cyber warfare and how it affects India?s national security. Based on the cyber threat environment, the books recommends a framework of cyber doctrine and cyber strategies as well as organisational structure of various organisations which a nation needs to invest in. more...