The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cryptography InfoSec Pro Guideby Sean-Philip Oriyano

    McGraw-Hill Education 2013; US$ 40.00

    1 The Language of Cryptography 2 History of Cryptography 3 Components of Cryptography 4 Ciphers 5 Algorithms 6 Hashing and Message Digests 7 Cryptanalysis and Code Breaking 8 Public Key Infastructure 9 Steganography 10 Applied Cryptography 11 Quantum Cryptography 12 Where Cryptography is Going more...

  • Cyber Attackby Paul Day

    Carlton Books Ltd 2014; Not Available

    There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made... more...

  • Penetration Testing Services Procurement Guideby CREST

    IT Governance Ltd 2014; Not Available

    Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities more...

  • IT-Sicherheit mit Systemby Klaus-Rainer Müller

    Springer 2014; US$ 59.99

    Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhangig von der Sicherheit und Kontinuitat sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgangiges, praxisorientiertes und geschaftszentriertes... more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • The Network Security Test Labby Michael Gregg

    Wiley 2015; US$ 50.00

    The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process,... more...

  • Cooperative Anonymous Message Authentication in Vehicular Ad Hoc Networksby Xiaodong Lin; Rongxing Lu

    Wiley 2015; US$ 135.00

    This book discusses the unique design requirements for security and privacy preservation for vehicular communications. Then, it will focus on some challenges in order to achieve message authentication and preserve privacy, i.e., anonymous message authentication, for which no strategy exists. This book is a comprehensive, single information source... more...

  • The Antivirus Hacker's Handbookby Joxean Koret; Elias Bachaalany

    Wiley 2015; US$ 50.00

    The book focusses on how to reverse engineer antivirus software, detect vulnerabilities and exploit them. This knowledge can benefit both an attacker (legal or otherwise, as happens with any kind of knowledge) as well as antivirus software vendors. It’s composed of the following sections: Reverse engineering antivirus software Antivirus... more...

  • Artificial Immune System and Applications in Computer Securityby Yinglan Tan

    Wiley 2015; US$ 105.00

    This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial... more...