The Leading eBooks Store Online

3,812,032 members ⚫ 1,249,629 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cryptography and Security Systemsby Zbigniew Kotulski; Bogdan Ksiezopolski; Katarzyna Mazur

    Springer Berlin Heidelberg 2014; US$ 53.83

    This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining... more...

  • Applications and Techniques in Information Securityby Lynn Batten; Gang Li; Wenjia Niu; Matthew Warren

    Springer Berlin Heidelberg 2014; US$ 53.83

    This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections... more...

  • Cryptography and Information Security in the Balkansby Berna Ors; Bart Preneel

    Springer International Publishing 2015; US$ 46.29

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...

  • Der IT Security Managerby Heinrich Kersten; Gerhard Klett

    Springer Fachmedien Wiesbaden 2015; US$ 38.90

    Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden ?  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung... more...

  • International Conference on Security and Privacy in Communication Networksby Jing Tian; Jiwu Jing; Mudhakar Srivatsa

    Springer International Publishing 2015; US$ 61.37

    This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops... more...

  • Cyber Operationsby Mike O'Leary

    Apress 2015; US$ 43.06

    Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting... more...

  • ISSE 2015by Helmut Reimer; Norbert Pohlmann; Wolfgang Schneider

    Springer Fachmedien Wiesbaden 2015; US$ 86.13

    This book presents the most interesting talks given at ISSE 2015 ? the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: ·         Encrypted Communication ·         Trust Services, eID and Cloud Security ·         Industrial Security and Internet of Things ... more...

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security ? Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity.  more...

  • CISA: Certified Information Systems Auditor Study Guideby David L. Cannon; O'Hara; Allen Keele

    Wiley 2016; US$ 70.00 US$ 61.50

    The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete... more...

  • Fundamentals of Information Security Risk Management Auditingby Christopher Wright

    IT Governance Ltd 2016; US$ 19.95

    An introductory guide to information risk management auditing, giving an interesting and useful insight into the risks and controls/mitigations that you may encounter when performing or managing an audit of information risk. Case studies and chapter summaries impart expert guidance. more...