The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Penetration Testing Services Procurement Guideby CREST

    IT Governance Ltd 2014; Not Available

    Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities more...

  • Juniper QFX5100 Seriesby Jr. Douglas Richard Hanks

    O'Reilly Media 2014; US$ 55.99

    Ideal for network engineers involved in building a data center, this practical guide provides a comprehensive and technical deep-dive into the new Juniper QFX5100 switching family. You?ll learn how the Juniper QFX5100 enables you to create simple-to-use data centers or build some of the largest IP Fabrics in the world. This book is chock-full of... more...

  • Information Risk Managementby David Sutton

    BCS Learning & Development Limited 2014; US$ 39.99

    Information risk management (IRM) is about identifying, assessing and prioritising risks to keep information secure and available. This accessible book provides practical guidance to the principles and development of a strategic approach to an IRM programme. The only textbook for the BCS Practitioner Certificate in Information Risk Management. more...

  • Foundations of Codingby Jean-Guillaume Dumas; Jean-Louis Roch; É Tannier; ric; Sé Varrette; bastien

    Wiley 2015; US$ 110.00

    The book is based on the translation of a French version published by Dunod in 2007, and corrected and reprinted in 2009.  Compared to the French book, this book has been revised and significantly augmented. It contains 20% more pages and 27 new excercises; covers frequently used techniques such as elliptic curves, low density parity codes... more...

  • The Realities of Securing Big Databy Davi Ottenheimer

    Wiley 2015; US$ 30.00

    Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents IT managers with a difficult dilemma. On the one hand everyone from the smallest company to the largest... more...

  • Security Intelligenceby Qing Li; Gregory Clark

    Wiley 2015; US$ 60.00

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides  you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation... more...

  • Phishing Dark Watersby Christopher Hadnagy; Michele Fincher

    Wiley 2015; US$ 35.00

    An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate... more...

  • The Mobile Application Hacker's Handbookby Dominic Chell; Tyrone Erasmus; Jon Lindsay; Shaun Colley; Ollie Whitehouse

    Wiley 2015; US$ 60.00

    See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications... more...

  • Bitcoin Paymentsby Slava Gomzin

    Wiley 2015; US$ 50.00

    The practical guide to implementing Bitcoin and other alt currencies in your business Bitcoin Payments, Implementing Secure Crypto Transactions is your "under-the-hood" guide for implementing Bitcoin payments, both online and on location. With a focus on practicalities, this book explores all aspects of Bitcoin acceptance for merchants from the... more...

  • Network Attacks and Exploitationby Matthew Monte

    Wiley 2015; US$ 45.00

    Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security... more...