The Leading eBooks Store Online

3,603,993 members ⚫ 1,165,375 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Hacking For Dummiesby Kevin Beaver

    Wiley 2015; US$ 29.99 US$ 23.99

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5 th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities... more...

  • Datenschutz und Sicherheit - für OS X Mavericksby Giesbert Damaschke

    Amac-Buch Verlag 2013; US$ 0.00

    Keine Frage - auf den Festplatten der Computer befinden sich allerlei wichtige Daten. Und da die Datenträger in den Rechnern oftmals bereits 1 TByte und größer sind, sollte der Anwender sich um zuverlässige Backups kümmern. Nicht nur die Fotos der Familie in iPhoto und die Songs und Videos in iTunes wollen sicher aufbewahrt werden - auch die ganzen... more...

  • Trust in Social Mediaby Jiliang Tang; Huan Liu

    Morgan & Claypool Publishers 2015; US$ 36.00

    Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, more...

  • The Security Consultant's Handbookby Richard Bingley

    IT Governance Ltd 2015; US$ 59.95

    The Security Consultant's Handbook  sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. more...

  • Application security in the ISO27001:2013 Environmentby Vinod Vasudevan

    IT Governance Ltd 2015; Not Available

    Application Security in the ISO 27001:2013 Environment  explains how organisations can implement and maintain effective security practices to protect their web applications as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO 27001. more...

  • PCI DSS: A Pocket Guide, fourth editionby Alan Calder; Geraint Williams

    IT Governance Ltd 2015; US$ 14.95

    Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing.  more...

  • PCI DSS 3.1by Branden R. Williams

    Elsevier Science 2015; US$ 29.95

    PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes to PCI DSS 3.1, and includes new case studies that discuss the specific implications for making... more...

  • A Study of Black Hole Attack Solutionsby Elahe Fazeldehkordi; I.S. Amiri; Oluwatobi Ayodeji Akanbi

    Elsevier Science 2015; US$ 69.95

    Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in... more...

  • Practical Deployment of Cisco Identity Services Engine (ISE)by Andy Richter; Jeremy Wood

    Elsevier Science 2015; US$ 69.95

    With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise... more...

  • Gut gerüstet gegen Überwachung im Webby Johanna C. Czeschik; Matthias Lindhorst; Roswitha Jehle

    Wiley 2015; US$ 10.50 US$ 9.10

    Sie haben zwar nichts zu verbergen, möchten aber trotzdem nicht, dass irgendjemand Ihre E-Mails mitliest, Ihr Surfverhalten analysiert oder Ihre Kreditkartendaten ausspäht? Mit welchen einfachen Maßnahmen Sie sich und Ihre Daten schützen können, erfahren Sie in diesem Buch. Die Autoren zeigen Ihnen, wie Sie Ihren Browser absichern... more...