The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 80.00

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems... more...

  • Effective Monitoring and Alertingby Slawek Ligus

    O'Reilly Media 2012; US$ 15.99

    With this practical book, you?ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability... more...

  • Hands-On Oracle Application Express Securityby Recx

    Wiley 2013; US$ 24.99

    An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with... more...

  • An Introduction to Information Security and ISO 27001by Steve G. Watkins

    IT Governance Publishing 2008; US$ 14.95

    This new pocket guide will suit both individuals who need an introduction to a topic that they know little about, and also organizations implementing, or considering implementing, some sort of information security management regime, particularly if using ISO/IEC 27001:2005 more...

  • PCI DSS A Pocket Guideby Alan Calder; Nicki Carter

    IT Governance Publishing 2011; US$ 14.95

    This handy pocket guide will provide you with all the information you will need when considering how to approach the PCI DSS V2.0, and is an ideal tool for awareness training for your PCI staff. more...

  • CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401)by Glen E. Clarke

    McGraw-Hill Education 2014; US$ 50.00

    The best fully integrated study system available for the CompTIA Security+ exam! Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. With hundreds of practice exam questions, including... more...

  • Social Engineering in IT Security: Tools, Tactics, and Techniquesby Sharon Conheady

    McGraw-Hill Education 2014; US$ 40.00

    Cutting-edge social engineering testing techniques Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance,... more...

  • Official (ISC)2 Guide to the CCFP CBKby Peter Stephenson

    Taylor and Francis 2014; US$ 79.95

    Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has?requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFP SM ) designation ensures that certification holders possess the necessary breadth,... more...

  • Cryptography InfoSec Pro Guideby Sean-Philip Oriyano

    McGraw-Hill Education 2013; US$ 40.00

    Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption... more...

  • CompTIA Security+ Certification Practice Exams, Second Edition (Exam SY0-401)by Daniel Lachance; Glen E. Clarke

    McGraw-Hill Education 2014; US$ 30.00

    Don't Let the Real Test Be Your First Test! Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. CompTIA Security+ Certification Practice Exams , Second Edition (Exam SY0-401)... more...