The Leading eBooks Store Online

3,597,636 members ⚫ 1,163,417 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cyber Security Awareness for Corporate Directors and Board Membersby David Willson; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Cyber Security Awareness for Corporate Directors and Board Members  is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to... more...

  • Theoretical and Experimental Methods for Defending Against DDoS Attacksby I.S. Amiri; M.R.K. Soltanian

    Elsevier Science 2015; US$ 69.95

    Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the... more...

  • Cyber Security Awareness for CEOs and Managementby David Willson; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Cyber Security for CEOs and Managment   is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to... more...

  • Meeting People via WiFi and Bluetoothby Joshua Schroeder; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Meeting People via WiFi and Bluetooth  will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book... more...

  • Essential Skills for Hackersby Kevin Cardwell; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how... more...

  • Deploying Secure Containers for Training and Developmentby Jon Schipp; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. Provides information on using secure containers for training and develpoment.... more...

  • Digital Forensicsby John Sammons

    Elsevier Science 2015; US$ 49.95

    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent... more...

  • Cryptography and Information Security in the Balkansby Berna Ors; Bart Preneel

    Springer International Publishing 2015; US$ 72.00

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...

  • International Conference on Security and Privacy in Communication Networksby Jing Tian; Jiwu Jing; Mudhakar Srivatsa

    Springer International Publishing 2015; US$ 95.00

    This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops... more...

  • Cyber Operationsby Mike O'Leary

    Apress 2015; US$ 59.99

    Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting... more...