The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cryptography and Information Security in the Balkansby Berna Ors; Bart Preneel

    Springer International Publishing 2015; US$ 72.00

    This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named:... more...

  • Cyber Operationsby Mike O'Leary

    Apress 2015; US$ 59.99

    Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting... more...

  • ISSE 2015by Helmut Reimer; Norbert Pohlmann; Wolfgang Schneider

    Springer Fachmedien Wiesbaden 2015; US$ 99.00

    This book presents the most interesting talks given at ISSE 2015 ? the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: ·         Encrypted Communication ·         Trust Services, eID and Cloud Security ·         Industrial Security and Internet of Things ... more...

  • International Conference on Security and Privacy in Communication Networksby Jing Tian; Jiwu Jing; Mudhakar Srivatsa

    Springer International Publishing 2015; US$ 95.00

    This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops... more...

  • Automated Software Diversityby Per Larsen; Stefan Brunthaler; Lucas Davi; Ahmad-Reza Sadeghi

    Morgan & Claypool Publishers 2015; US$ 28.00

    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often... more...

  • Theory of Cryptographyby Eyal Kushilevitz; Tal Malkin

    Springer Berlin Heidelberg 2015; US$ 119.00

    The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on... more...

  • Der IT Security Managerby Heinrich Kersten; Gerhard Klett

    Springer Fachmedien Wiesbaden 2015; US$ 54.99

    Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden ?  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung... more...

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity. It provides recommendations on aligning a security programme with wider... more...

  • CISA: Certified Information Systems Auditor Study Guideby David L. Cannon; O'Hara; Allen Keele

    Wiley 2016; US$ 70.00

    The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete... more...

  • Database Anonymizationby Josep Domingo-Ferrer; David Sánchez; Jordi Soria-Comas

    Morgan & Claypool Publishers 2016; US$ 36.00

    The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the data refer... more...