The Leading eBooks Store Online
3,725,826 members ⚫ 1,209,635 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2013; US$ 40.00
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption... more...
- Carlton Books Ltd 2014; Not Available
There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made... more...
- Springer Fachmedien Wiesbaden 2014; US$ 41.75
Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhängig von der Sicherheit und Kontinuität sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgängiges, praxisorientiertes und geschäftszentriertes... more...
- Wiley 2016; US$ 30.00 US$ 26.50
Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...
- Wiley 2015; US$ 50.00 US$ 43.33
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through... more...
- Wiley 2016; US$ 105.00 US$ 91.00
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational... more...
- Wiley 2015; US$ 29.99 US$ 27.29
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5 th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities... more...
- Amac-Buch Verlag 2013; US$ 0.00
Keine Frage - auf den Festplatten der Computer befinden sich allerlei wichtige Daten. Und da die Datenträger in den Rechnern oftmals bereits 1 TByte und größer sind, sollte der Anwender sich um zuverlässige Backups kümmern. Nicht nur die Fotos der Familie in iPhoto und die Songs und Videos in iTunes wollen sicher aufbewahrt werden - auch die ganzen... more...
- Morgan & Claypool Publishers 2015; US$ 36.00
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, more...
- Elsevier Science 2015; US$ 29.95
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making... more...