The Leading eBooks Store Online

3,788,875 members ⚫ 1,234,658 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Essential Skills for Hackersby Kevin Cardwell; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how... more...

  • Deploying Secure Containers for Training and Developmentby Jon Schipp; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. Provides information on using secure containers for training and develpoment.... more...

  • Digital Forensicsby John Sammons

    Elsevier Science 2015; US$ 49.95

    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent... more...

  • Cryptography and Information Security in the Balkansby Berna Ors; Bart Preneel

    Springer International Publishing 2015; US$ 45.64

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...

  • Cyber Operationsby Mike O'Leary

    Apress 2015; US$ 42.45

    Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting... more...

  • ISSE 2015by Helmut Reimer; Norbert Pohlmann; Wolfgang Schneider

    Springer Fachmedien Wiesbaden 2015; US$ 84.91

    This book presents the most interesting talks given at ISSE 2015 ? the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: ·         Encrypted Communication ·         Trust Services, eID and Cloud Security ·         Industrial Security and Internet of Things ... more...

  • Der IT Security Managerby Heinrich Kersten; Gerhard Klett

    Springer Fachmedien Wiesbaden 2015; US$ 38.35

    Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden ?  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung... more...

  • International Conference on Security and Privacy in Communication Networksby Jing Tian; Jiwu Jing; Mudhakar Srivatsa

    Springer International Publishing 2015; US$ 60.50

    This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops... more...

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security ? Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity.  more...

  • Automated Security Analysis of Android and iOS Applications with Mobile Security Frameworkby Henry Dalziel; Ajin Abraham

    Elsevier Science 2015; US$ 39.95

    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators... more...