The Leading eBooks Store Online

3,863,569 members ⚫ 1,270,059 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Privacy Risk Analysisby Sourya Joyee De; Daniel Le Métayer

    Morgan & Claypool Publishers 2016; US$ 40.00

    Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or... more...

  • IT-Sicherheitsmanagement nach der neuen ISO 27001by Heinrich Kersten; Gerhard Klett; Jürgen Reuter; Klaus-Werner Schröder

    Springer Fachmedien Wiesbaden 2016; US$ 44.20

    Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der neuen Fassung der Norm ISO/IEC 27001. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm.... more...

  • Cyber Secure Development Lifecycleby Jim Whitmore

    Wiley 2017; US$ 60.00 US$ 52.99

    Cyber Secure Development Lifecycle offers an innovative approach to security that addresses both the reactive and proactive aspects of security. It engages all roles involved in the development and management of Information Technology in addressing the security challenge.  The book includes a Concepts and Models section to set the foundation... more...

  • From Hacking to Report Writingby Robert Svensson

    Apress 2016; US$ 44.76

    Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses... more...

  • Hacken f?r Dummiesby Kevin Beaver

    Wiley 2016; US$ 21.95 US$ 19.02

    F?rchten Sie um Ihre Unternehmensdaten? Machen Sie sich Sorgen um Ihre IT-Systeme, wenn Sie wieder einmal lesen, dass unbekannte Hacker ein Unternehmen f?r Wochen lahmgelegt haben? Warten Sie nicht ab, bis es auch in Ihren Systemen passiert, sondern tun Sie etwas! Dabei hilft Ihnen dieses Buch. Versetzen Sie sich als erstes in die Rolle des Schurken... more...

  • Meeting Security Challenges through Data Analytics and Decision Supportby E. Shahbazian; G. Rogova

    IOS Press 2016; Not Available

    The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the quality of decisions and operational processes in areas such as counterterrorism and... more...

  • Certified Ethical Hacker (CEH) Foundation Guideby Sagar Ajay Rahalkar

    Apress 2016; US$ 19.02

    Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also... more...

  • NTP Securityby Allan Liska

    Apress 2016; US$ 25.73

    Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline. NTP Security: A Quick-Start Guide  provides an... more...

  • Hacking the Hackerby Roger A. Grimes

    Wiley 2017; US$ 25.00 US$ 21.99

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers,... more...

  • Cyber Crimesby Vannesa Pitts

    Vij Books India Private Limited 2017; US$ 4.95

    Computer crime refers to criminal activity involving a computer. The computer may be used in the commission of a crime or it may be the target. This book covers the history of Cyber Crimes and gives some of the world's most famous Cyber Crime and Attacks. more...