The Leading eBooks Store Online

3,840,610 members ⚫ 1,266,180 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Artificial Immune Systemby Ying Tan

    Wiley 2016; US$ 105.00 US$ 91.00

    This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational... more...

  • Datenschutz und Sicherheit - für OS X Mavericksby Giesbert Damaschke

    Amac-Buch Verlag 2013; US$ 0.00

    Keine Frage - auf den Festplatten der Computer befinden sich allerlei wichtige Daten. Und da die Datenträger in den Rechnern oftmals bereits 1 TByte und größer sind, sollte der Anwender sich um zuverlässige Backups kümmern. Nicht nur die Fotos der Familie in iPhoto und die Songs und Videos in iTunes wollen sicher aufbewahrt werden - auch die ganzen... more...

  • The Security Consultant's Handbookby Richard Bingley

    IT Governance Ltd 2015; US$ 54.95

    The Security Consultant's Handbook  sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. more...

  • Application security in the ISO27001:2013 Environmentby Vinod Vasudevan

    IT Governance Ltd 2015; US$ 45.95

    Application Security in the ISO 27001:2013 Environment  explains how organisations can implement and maintain effective security practices to protect their web applications as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO 27001. more...

  • PCI DSS: A Pocket Guide, fourth editionby Alan Calder; Geraint Williams

    IT Governance Ltd 2015; US$ 14.95

    Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing.  more...

  • Gut gerüstet gegen Überwachung im Webby Johanna C. Czeschik; Matthias Lindhorst; Roswitha Jehle

    Wiley 2015; US$ 10.50 US$ 9.10

    Sie haben zwar nichts zu verbergen, m?chten aber trotzdem nicht, dass irgendjemand Ihre E-Mails mitliest, Ihr Surfverhalten analysiert oder Ihre Kreditkartendaten aussp?ht? Mit welchen einfachen Ma?nahmen Sie sich und Ihre Daten sch?tzen k?nnen, erfahren Sie in diesem Buch. Die Autoren zeigen Ihnen, wie Sie Ihren Browser absichern und anonym ?ber das... more...

  • Cryptography and Security Systemsby Zbigniew Kotulski; Bogdan Ksiezopolski; Katarzyna Mazur

    Springer Berlin Heidelberg 2014; US$ 54.30

    This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining... more...

  • Applications and Techniques in Information Securityby Lynn Batten; Gang Li; Wenjia Niu; Matthew Warren

    Springer Berlin Heidelberg 2014; US$ 54.30

    This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections... more...

  • Essential Skills for Hackersby Kevin Cardwell; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how... more...

  • Cryptography and Information Security in the Balkansby Berna Ors; Bart Preneel

    Springer International Publishing 2015; US$ 46.69

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...