The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • IT-Sicherheit mit Systemby Klaus-Rainer Müller

    Springer Fachmedien Wiesbaden 2014; US$ 59.99

    Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhängig von der Sicherheit und Kontinuität sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgängiges, praxisorientiertes und geschäftszentriertes... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • The Antivirus Hacker's Handbookby Joxean Koret; Elias Bachaalany

    Wiley 2015; US$ 50.00

    The book focusses on how to reverse engineer antivirus software, detect vulnerabilities and exploit them. This knowledge can benefit both an attacker (legal or otherwise, as happens with any kind of knowledge) as well as antivirus software vendors. It’s composed of the following sections: Reverse engineering antivirus software Antivirus... more...

  • Artificial Immune System and Applications in Computer Securityby Yinglan Tan

    Wiley 2016; US$ 105.00

    This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial... more...

  • The Invisible Lifeby Michael Bazzell

    Wiley 2015; US$ 30.00

    The book will be written as a chronological story but will include specific technical details and processes that can be replicated by the reader. The focus will be on the various scenarios that make people targets and the ideal plan to make anyone's home and assets impossible to find. The book's content and how-to's are all legal and cover: How... more...

  • Hacking For Dummiesby Kevin Beaver

    Wiley 2015; US$ 29.99 US$ 23.99

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5 th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities... more...

  • Secure Multiparty Computation and Secret Sharingby Ronald Cramer; Ivan Bjerre Damgård; Jesper Buus Nielsen

    Cambridge University Press 2015; US$ 64.00

    This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts. more...

  • Introduction to Network Securityby Jie Wang; Zachary A. Kissel

    Wiley 2015; US$ 130.00

    Introductory textbook in the important area of network security for undergraduate and graduate students • Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security • Fully updated to reflect new developments in network security • Introduces a chapter... more...

  • Hacking Wireless Networks For Dummiesby Kevin Beaver; Peter T. Davis; Devin K. Akin

    Wiley 2011; US$ 34.99 US$ 27.99

    Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd... more...