The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Optimizing IEEE 802.11i Resource and Security Essentialsby I.S. Amiri; Parisa Naraei; Iman Saberi

    Elsevier Science 2014; US$ 69.95

    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE... more...

  • How to Define and Build an Effective Cyber Threat Intelligence Capabilityby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from... more...

  • How to Defeat Advanced Malwareby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise... more...

  • Introduction to US Cybersecurity Careersby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into... more...

  • Countdown to Zero Dayby Kim Zetter

    Crown Publishing Group 2014; US$ 25.00

    Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran?s nuclear efforts and shows how its existence has ushered in a new age of warfare?one in which a digital attack can have the same destructive capability as a megaton bomb.   In January 2010, inspectors with the International Atomic Energy Agency noticed... more...

  • Information Security Analyticsby Mark Talabis; Robert McPherson; I Miyamoto; Jason Martin

    Elsevier Science 2014; US$ 59.95

    Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information... more...

  • Burp Suite Essentialsby Akash Mahajan

    Packt Publishing 2014; US$ 17.99

    If you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user. more...

  • Augmented Reality Law, Privacy, and Ethicsby Brian Wassom

    Elsevier Science 2014; US$ 49.95

    Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and... more...

  • Google Earth Forensicsby Michael Harrington; Michael Cross

    Elsevier Science 2014; US$ 39.95

    Google Earth Forensics is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling... more...

  • Building an Intelligence-Led Security Programby Allan Liska

    Elsevier Science 2014; US$ 69.95

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices... more...