The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • An Introduction to Information Security and ISO 27001by Steve G. Watkins

    IT Governance Publishing 2008; US$ 14.95

    This new pocket guide will suit both individuals who need an introduction to a topic that they know little about, and also organizations implementing, or considering implementing, some sort of information security management regime, particularly if using ISO/IEC 27001:2005 more...

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 80.00

    The world has changed radically since the first edition of thisbook was published in 2001. Spammers, virus writers, phishermen,money launderers, and spies now trade busily with each other in alively online criminal economy and as they specialize, they getbetter. In this indispensable, fully updated guide, Ross Andersonreveals how to build systems that... more...

  • PCI DSS A Pocket Guideby Alan Calder; Nicki Carter

    IT Governance Publishing 2011; US$ 14.95

    This handy pocket guide will provide you with all the information you will need when considering how to approach the PCI DSS V2.0, and is an ideal tool for awareness training for your PCI staff. more...

  • Effective Monitoring and Alertingby Slawek Ligus

    O'Reilly Media 2012; US$ 15.99

    With this practical book, you?ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability... more...

  • Security Bibliographyby Safari Content Team

    Safari Books Online 2013; US$ 0.00

    People are increasingly concerned by the security of the information they put online and worry about their privacy and their online profile. With new attacks, information leaks, vulnerabilities and exploits published every week, information security is a constant learning process. To be effective and stay up to date, you need the right resources to... more...

  • Hands-On Oracle Application Express Securityby Recx

    Wiley 2013; US$ 24.99

    An example-driven approach to securing Oracle APEXapplications As a Rapid Application Development framework, Oracle ApplicationExpress (APEX) allows websites to easily be created based on datawithin an Oracle database. Using only a web browser, you candevelop and deploy professional applications that are both fast andsecure. However, as with any... more...

  • Cryptography InfoSec Pro Guideby Sean-Philip Oriyano

    McGraw-Hill Education 2013; US$ 40.00

    Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption... more...

  • Cyber Attackby Paul Day

    Carlton Books Ltd 2014; Not Available

    There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made... more...

  • IT-Sicherheit mit Systemby Klaus-Rainer Müller

    Springer 2014; US$ 59.99

    Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhangig von der Sicherheit und Kontinuitat sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgangiges, praxisorientiertes und geschaftszentriertes... more...