The Leading eBooks Store Online

3,725,826 members ⚫ 1,209,635 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security ? Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity.  more...

  • CISA: Certified Information Systems Auditor Study Guideby David L. Cannon; O'Hara; Allen Keele

    Wiley 2016; US$ 70.00 US$ 61.50

    The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete... more...

  • Database Anonymizationby Josep Domingo-Ferrer; David Sánchez; Jordi Soria-Comas

    Morgan & Claypool Publishers 2016; US$ 36.00

    The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the data refer... more...

  • Automated Security Analysis of Android and iOS Applications with Mobile Security Frameworkby Henry Dalziel; Ajin Abraham

    Elsevier Science 2015; US$ 39.95

    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators... more...

  • Introduction to Secure Outsourcing Computationby Xiaofeng Chen

    Morgan & Claypool Publishers 2016; US$ 32.00

    With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive... more...

  • Windows Registry Forensicsby Harlan Carvey

    Elsevier Science 2016; US$ 69.95

    Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition , provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as... more...

  • Fundamentals of Information Security Risk Management Auditingby Christopher Wright

    IT Governance Ltd 2016; US$ 19.95

    An introductory guide to information risk management auditing, giving an interesting and useful insight into the risks and controls/mitigations that you may encounter when performing or managing an audit of information risk. Case studies and chapter summaries impart expert guidance. more...

  • Nine Steps to Successby Alan Calder

    IT Governance Ltd 2016; US$ 37.95

    Aligned with the latest iteration of the Standard ? ISO 27001:2013 ? this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language more...

  • Selling Information Security to the Boardby Alan Calder

    IT Governance Ltd 2016; US$ 14.95

    This pocket guide will help you with the essential sales skills that, persuade company directors to commit money and resources to your information security initiatives. more...

  • Cyber Guerillaby Jelle Van Haaster; Rickey Gevers; Martijn Sprengers

    Elsevier Science 2016; US$ 49.95

    Much as Che Guevara?s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well... more...