The Leading eBooks Store Online

3,667,858 members ⚫ 1,180,414 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cyber Security Awareness for Corporate Directors and Board Membersby David Willson; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    Cyber Security Awareness for Corporate Directors and Board Members  is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to... more...

  • Deploying Secure Containers for Training and Developmentby Jon Schipp; Henry Dalziel

    Elsevier Science 2015; US$ 39.95

    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. Provides information on using secure containers for training and develpoment.... more...

  • Digital Forensicsby John Sammons

    Elsevier Science 2015; US$ 49.95

    Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent... more...

  • Cryptography and Information Security in the Balkansby Berna Ors; Bart Preneel

    Springer International Publishing 2015; US$ 48.29

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...

  • Cyber Operationsby Mike O'Leary

    Apress 2015; US$ 44.92

    Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting... more...

  • ISSE 2015by Helmut Reimer; Norbert Pohlmann; Wolfgang Schneider

    Springer Fachmedien Wiesbaden 2015; US$ 99.00

    This book presents the most interesting talks given at ISSE 2015 ? the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: ·         Encrypted Communication ·         Trust Services, eID and Cloud Security ·         Industrial Security and Internet of Things ... more...

  • Der IT Security Managerby Heinrich Kersten; Gerhard Klett

    Springer Fachmedien Wiesbaden 2015; US$ 54.99

    Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden ?  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung... more...

  • Database Anonymizationby Josep Domingo-Ferrer; David Sánchez; Jordi Soria-Comas

    Morgan & Claypool Publishers 2016; US$ 36.00

    The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the data refer... more...

  • International Conference on Security and Privacy in Communication Networksby Jing Tian; Jiwu Jing; Mudhakar Srivatsa

    Springer International Publishing 2015; US$ 64.01

    This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops... more...

  • Automated Software Diversityby Per Larsen; Stefan Brunthaler; Lucas Davi; Ahmad-Reza Sadeghi

    Morgan & Claypool Publishers 2015; US$ 28.00

    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often... more...