The Leading eBooks Store Online

3,597,636 members ⚫ 1,163,417 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Nine Steps to Successby Alan Calder

    IT Governance Ltd 2016; US$ 37.95

    Aligned with the latest iteration of the Standard – ISO 27001:2013 – this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language more...

  • Selling Information Security to the Boardby Alan Calder

    IT Governance Ltd 2016; US$ 14.95

    This pocket guide will help you with the essential sales skills that, persuade company directors to commit money and resources to your information security initiatives. more...

  • Cyber-Assurance for the Internet of Thingsby Tyson Brooks

    Wiley 2016; US$ 120.00 US$ 104.00

    The goal of this book is to present an information assurance (IA) approach to the Internet of Things (IoT). From an information security/IA perspective, the IoT must address the delivery of authentic, accurate, secure, reliable, timely information, regardless of threat conditions, over the distributed and heterogeneous computing and communication... more...

  • OS X Incident Responseby Jaron Bradley

    Elsevier Science 2016; US$ 59.95

    OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly... more...

  • Insider Threatby Julie Mehan

    IT Governance Ltd 2016; US$ 54.95

    Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. more...

  • Executing Windows Command Line Investigationsby Chet Hosmer; Joshua Bartolomie; Rosanne Pelli

    Elsevier Science 2016; US$ 69.95

    The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal... more...

  • Cyber Guerillaby Jelle Van Haaster; Rickey Gevers; Martijn Sprengers

    Elsevier Science 2016; US$ 49.95

    Much as Che Guevara?s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well... more...

  • Audio Content Securityby Sogand Ghorbani; I.S. Amiri

    Elsevier Science 2016; US$ 69.95

    Audio watermarking is used to add related information to the audio content to protect copyright and content security. Audio watermarking has been relatively overlooked in comparison to other types of watermarking. There have been many studies on proposed audio watermarking methods and improving previous methods. However, there is no work that focuses... more...

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 85.00 US$ 73.67

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems... more...

  • Cleaning Windows Vista For Dummiesby Allen Wyatt

    Wiley 2007; US$ 21.99 US$ 17.59

    Find out what you should clean, when, and how Dump programs you don't need, archive data, and bring order to your desktop Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning tools that help you organize your data and e-mail, archive... more...