The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CISSP Practice Exams, Third Editionby Shon Harris

    McGraw-Hill Education 2015; US$ 40.00

    Don?t Let the Real Test Be Your First Test! Fully updated throughout and featuring new question types, this self-study tool contains more than 1250 realistic practice exam questions covering all 10 CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. To aid in your understanding of the... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • Security Intelligenceby Qing Li; Gregory Clark

    Wiley 2015; US$ 60.00

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides  you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation... more...

  • Phishing Dark Watersby Christopher Hadnagy; Michele Fincher

    Wiley 2015; US$ 35.00

    An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate... more...

  • Bitcoin Paymentsby Slava Gomzin

    Wiley 2015; US$ 50.00

    The practical guide to implementing Bitcoin and other alt currencies in your business Bitcoin Payments, Implementing Secure Crypto Transactions is your "under-the-hood" guide for implementing Bitcoin payments, both online and on location. With a focus on practicalities, this book explores all aspects of Bitcoin acceptance for merchants from the... more...

  • Network Attacks and Exploitationby Matthew Monte

    Wiley 2015; US$ 45.00

    Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security... more...

  • The Network Security Test Labby Michael Gregg

    Wiley 2015; US$ 50.00

    The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process,... more...

  • Cooperative Anonymous Message Authentication in Vehicular Ad Hoc Networksby Xiaodong Lin; Rongxing Lu

    Wiley 2015; US$ 135.00

    This book discusses the unique design requirements for security and privacy preservation for vehicular communications. Then, it will focus on some challenges in order to achieve message authentication and preserve privacy, i.e., anonymous message authentication, for which no strategy exists. This book is a comprehensive, single information source... more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • Foundations of Codingby Jean-Guillaume Dumas; Jean-Louis Roch; É Tannier; ric; Sé Varrette; bastien

    Wiley 2015; US$ 110.00

    Offers a comprehensive introduction to the fundamentalstructures and applications of a wide range of contemporary codingoperations This book offers a comprehensive introduction to the fundamentalstructures and applications of a wide range of contemporary codingoperations. This text focuses on the ways to structure informationso that its transmission... more...