The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cryptography InfoSec Pro Guideby Sean-Philip Oriyano

    McGraw-Hill Education 2013; US$ 40.00

    Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption... more...

  • Cyber Attackby Paul Day

    Carlton Books Ltd 2014; Not Available

    There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made... more...

  • Penetration Testing Services Procurement Guideby CREST

    IT Governance Ltd 2014; Not Available

    Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities more...

  • IT-Sicherheit mit Systemby Klaus-Rainer Müller

    Springer 2014; US$ 59.99

    Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhangig von der Sicherheit und Kontinuitat sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgangiges, praxisorientiertes und geschaftszentriertes... more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • Vehicular Ad Hoc Network Security and Privacyby Xiaodong Lin; Rongxing Lu

    Wiley 2015; US$ 125.00

    This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology?s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique... more...

  • The Antivirus Hacker's Handbookby Joxean Koret; Elias Bachaalany

    Wiley 2015; US$ 50.00

    The book focusses on how to reverse engineer antivirus software, detect vulnerabilities and exploit them. This knowledge can benefit both an attacker (legal or otherwise, as happens with any kind of knowledge) as well as antivirus software vendors. It’s composed of the following sections: Reverse engineering antivirus software Antivirus... more...

  • Artificial Immune System and Applications in Computer Securityby Yinglan Tan

    Wiley 2016; US$ 105.00

    This book focuses on the technologies and applications of artificial immune systems in malware and spam detection proposed in recent years by the computation intelligence laboratory at Peking University, China. It offers a theoretical perspective and practical solutions to graduate students, practitioners, and researchers working in the area of artificial... more...

  • The Invisible Lifeby Michael Bazzell

    Wiley 2015; US$ 30.00

    The book will be written as a chronological story but will include specific technical details and processes that can be replicated by the reader. The focus will be on the various scenarios that make people targets and the ideal plan to make anyone's home and assets impossible to find. The book's content and how-to's are all legal and cover: How... more...