The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Take Control of 1Passwordby Joe Kissell

    TidBITS 2014; US$ 10.00

    Updated May 20, 2014 Speed through Web logins with 1Password 4! Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this ebook, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter Web login data... more...

  • Netzwerk- und Datensicherheitby Martin Kappes

    Springer 2013; US$ 39.99

    Sie sind ein erfolgreicher Hacker, finden jede Sicherheitslücke, überwinden jede Firewall und sind es gewohnt, immer an Ihr Ziel zu kommen? Dann haben wir jetzt schlechte Nachrichten für Sie: Dieses Buch wird Ihnen das Leben schwer machen! Dem Autor gelingt es, solide und verständlich das Hintergrundwissen über Netzwerk- und Datensicherheit zu vermitteln,... more...

  • Official (ISC)2® Guide to the ISSMP® CBK®, Second Editionby (ISC)² Corporate

    Taylor and Francis 2015; US$ 79.95

    Preparing professionals for certification and job readiness, the Official (ISC)² ® Guide to CISSP ® -ISSMP ® CBK ® , Second Edition supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management,... more...

  • Network Securityby BRAGG

    McGraw-Hill Education 2012; US$ 70.00

    Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more. more...

  • A Cryptography Primerby Philip N. Klein

    Cambridge University Press 2014; US$ 26.00

    This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs. more...

  • Official (ISC)2 Guide to the CISSP CBK, Fourth Editionby Adam Gordon

    Taylor and Francis 2015; US$ 79.95

    This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC)² authorized instructors who are highly knowledgeable about the latest information security-related developments and are proven experts in the CISSP common body of knowledge (CBK). Endorsed by the (ISC)², the Official (ISC) 2® Guide to the CISSP ®... more...

  • Biometrics in the New Worldby Julian Ashbourn

    Springer 2014; US$ 69.99

    This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held... more...

  • QC-LDPC Code-Based Cryptographyby Marco Baldi

    Springer 2014; US$ 54.99

    This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several... more...

  • Healthcare Information Privacy and Securityby Bernard Peter Robichau

    Springer 2014; US$ 34.99

    Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed.... more...

  • Internet Security You Can Affordby Christopher Dawson

    Cengage Learning PTR 2014; US$ 39.99

    Discover one of the most efficient, effective, and inexpensive ways to stop Internet threats and protect your organization or home from malware and objectionable content with Internet Security You Can Afford: The Untangle® Internet Gateway. This book by educator and well-known ZDnet technology expert Chris Dawson demonstrates how you can establish... more...