The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Penetration Testing Services Procurement Guideby CREST

    IT Governance Ltd 2014; Not Available

    Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities more...

  • Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Editionby Daniel Regalado; Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness; Branko Spasojevic; Ryan Linn; Stephen Sims

    McGraw-Hill Education 2015; US$ 60.00

    Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy?s current weapons, skills, and tactics... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • Security Intelligenceby Qing Li; Gregory Clark

    Wiley 2015; US$ 60.00

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides  you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation... more...

  • Phishing Dark Watersby Christopher Hadnagy; Michele Fincher

    Wiley 2015; US$ 35.00

    An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate... more...

  • The Mobile Application Hacker's Handbookby Dominic Chell; Tyrone Erasmus; Jon Lindsay; Shaun Colley; Ollie Whitehouse

    Wiley 2015; US$ 60.00

    See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications... more...

  • Bitcoin Paymentsby Slava Gomzin

    Wiley 2015; US$ 50.00

    The practical guide to implementing Bitcoin and other alt currencies in your business Bitcoin Payments, Implementing Secure Crypto Transactions is your "under-the-hood" guide for implementing Bitcoin payments, both online and on location. With a focus on practicalities, this book explores all aspects of Bitcoin acceptance for merchants from the... more...

  • Network Attacks and Exploitationby Matthew Monte

    Wiley 2015; US$ 45.00

    Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security... more...

  • The Network Security Test Labby Michael Gregg

    Wiley 2015; US$ 50.00

    The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process,... more...

  • Cooperative Anonymous Message Authentication in Vehicular Ad Hoc Networksby Xiaodong Lin; Rongxing Lu

    Wiley 2015; US$ 135.00

    This book discusses the unique design requirements for security and privacy preservation for vehicular communications. Then, it will focus on some challenges in order to achieve message authentication and preserve privacy, i.e., anonymous message authentication, for which no strategy exists. This book is a comprehensive, single information source... more...