The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cyber Operationsby Mike O'Leary

    Apress 2015; US$ 59.99

    Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting... more...

  • Der IT Security Managerby Heinrich Kersten; Gerhard Klett

    Springer Fachmedien Wiesbaden 2015; US$ 54.99

    Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden ?  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von IT-Sicherheitsbeauftragten bewährt. Die Inventarisierung aller Informationswerte (Assets), die Formulierung... more...

  • ISSE 2015by Helmut Reimer; Norbert Pohlmann; Wolfgang Schneider

    Springer Fachmedien Wiesbaden 2015; US$ 99.00

    This book presents the most interesting talks given at ISSE 2015 ? the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: ·         Encrypted Communication ·         Trust Services, eID and Cloud Security ·         Industrial Security and Internet of Things ... more...

  • Theory of Cryptographyby Eyal Kushilevitz; Tal Malkin

    Springer Berlin Heidelberg 2015; US$ 119.00

    The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on... more...

  • Automated Software Diversityby Per Larsen; Stefan Brunthaler; Lucas Davi; Ahmad-Reza Sadeghi

    Morgan & Claypool Publishers 2015; US$ 28.00

    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often... more...

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security ? Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity.  more...

  • CISA: Certified Information Systems Auditor Study Guideby David L. Cannon; O'Hara; Allen Keele

    Wiley 2016; US$ 70.00

    The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete... more...

  • Database Anonymizationby Josep Domingo-Ferrer; David Sánchez; Jordi Soria-Comas

    Morgan & Claypool Publishers 2016; US$ 36.00

    The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the data refer... more...

  • Automated Security Analysis of Android and iOS Applications with Mobile Security Frameworkby Henry Dalziel; Ajin Abraham

    Elsevier Science 2015; US$ 39.95

    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators... more...

  • Introduction to Secure Outsourcing Computationby Xiaofeng Chen

    Morgan & Claypool Publishers 2016; US$ 32.00

    With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive... more...