The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • IT-Sicherheit mit Systemby Klaus-Rainer Müller

    Springer 2014; US$ 59.99

    Die Effizienz, Existenz und Zukunft eines Unternehmens sind maßgeblich abhangig von der Sicherheit und Kontinuitat sowie den Risiken der Informationsverarbeitung. Die dreidimensionale IT-Sicherheitsmanagementpyramide V sowie die innovative und integrative IT-RiSiKo-Managementpyramide V liefern ein durchgangiges, praxisorientiertes und geschaftszentriertes... more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • The Network Security Test Labby Michael Gregg

    Wiley 2015; US$ 50.00

    The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process,... more...

  • Cooperative Anonymous Message Authentication in Vehicular Ad Hoc Networksby Xiaodong Lin; Rongxing Lu

    Wiley 2015; US$ 135.00

    This book discusses the unique design requirements for security and privacy preservation for vehicular communications. Then, it will focus on some challenges in order to achieve message authentication and preserve privacy, i.e., anonymous message authentication, for which no strategy exists. This book is a comprehensive, single information source... more...

  • The Antivirus Hacker's Handbookby Joxean Koret; Elias Bachaalany

    Wiley 2015; US$ 50.00

    The book focusses on how to reverse engineer antivirus software, detect vulnerabilities and exploit them. This knowledge can benefit both an attacker (legal or otherwise, as happens with any kind of knowledge) as well as antivirus software vendors. It’s composed of the following sections: Reverse engineering antivirus software Antivirus... more...

  • Narco-Cultsby Tony M. Kail

    CRC Press 2015; US$ 59.95

    Those who know about how spirituality plays into the world of drug smuggling have likely heard of Santa Muerte, Jesus Malverde, and Santería, but the details of the more obscure African religions and Latin American folk saints and cults often remain a mystery. While the vast majority of these religions are practiced by law-abiding citizens with no... more...

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 85.00

    "Security engineering is different from any other kind of programming. . . . if you're even thinking of doing any security engineering, you need to read this book." ? Bruce Schneier "This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work." ? Gary McGraw This book created the discipline of security... more...

  • Hands-On Oracle Application Express Securityby Recx

    Wiley 2013; US$ 24.99

    An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with... more...

  • Firewall Fundamentalsby Wes Noonan; Ido Dubrawsky

    Pearson Education 2006; US$ 45.99

    The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...