The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- CRC Press 2016; US$ 69.95
Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or... more...
- Wiley 2015; US$ 50.00
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through... more...
- IT Governance Ltd 2015; Not Available
Application Security in the ISO 27001:2013 Environment explains how organisations can implement and maintain effective security practices to protect their web applications – and the servers on which they reside – as part of a wider information security management system by following the guidance set out in the international standard... more...
- Springer Berlin Heidelberg 2014; US$ 84.00
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections... more...
- Elsevier Science 2015; US$ 39.95
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators... more...
- Morgan & Claypool Publishers 2015; US$ 28.00
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often... more...
- Wiley 2016; US$ 70.00
The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete... more...
- McGraw-Hill Education 2013; US$ 40.00
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption... more...
- Springer International Publishing 2015; US$ 72.00
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...
- Springer Berlin Heidelberg 2014; US$ 84.00
This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining... more...