The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Department of Defense Sponsored Information Security Researchby Department of Defense; Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs

    Wiley 2007; US$ 65.00

    After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of... more...

  • Web 2.0 Securityby Shreeraj Shah

    Course Technology PTR 2007; US$ 49.99

    Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security concerns... more...

  • Hacking Exposed: Malware and Rootkitsby Michael Davis; Sean Bodmer; Aaron LeMasters

    McGraw-Hill Education 2009; US$ 57.00

    Part I Malware Case Study: Please Review This Before Our Quarterly Meeting Chapter 1 Method of Infection Chapter 2 Malware Functionality Part II Rootkits Case Study: The Invisible Rootkit That Steals Your Bank Account Data Chapter 3 User-Mode Rootkits Chapter 4 Kernel-Mode Rootkits Chapter 5 Virtual Rootkits Chapter 6 The Future of Rootkits:... more...

  • CyberWar, CyberTerror, CyberCrimeby Julie E. Mehan

    IT Governance Publishing 2008; US$ 45.95

    CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that today’s corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. more...

  • Security in a Web 2.0+ Worldby Carlos Curtis Solari

    Wiley 2010; US$ 50.00

    Discover how technology is affecting your business, and whytypical security mechanisms are failing to address the issue ofrisk and trust. Security for a Web 2.0+ World looks at the perplexing issues ofcyber security, and will be of interest to those who need to knowhow to make effective security policy decisions to engineers whodesign ICT systems... more...

  • Introduction to Privacy-Preserving Data Publishingby Benjamin C.M. Fung; Ke Wang; Ada Wai-Chee Fu; Philip S. Yu

    CRC Press 2010; US$ 109.95

    THE FUNDAMENTALS Introduction Data Collection and Data Publishing What Is Privacy-Preserving Data Publishing? Related Research Areas Attack Models and Privacy Models Record Linkage Model Attribute Linkage Model Table Linkage Model Probabilistic Model Modeling Adversary?s Background Knowledge Anonymization Operations Generalization... more...

  • Virtualization and Forensicsby Diane Barrett; Greg Kipper

    Elsevier Science 2010; US$ 59.95

    Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments provides an introduction to virtualized environments and their implications on forensic investigations. It emphasizes the need for organizations using virtualization to be proactive rather than reactive. Being proactive means learning the methods in this book... more...

  • Securing SQL Serverby Denny Cherry

    Elsevier Science 2010; US$ 49.95

    Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing... more...

  • CISSPby James M. Stewart; Ed Tittel; Mike Chapple

    Wiley 2011; US$ 59.99

    Totally updated for 2011, here's the ultimate study guide for the CISSP exam Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP... more...

  • Encryption for Digital Contentby Aggelos Kiayias; Serdar Pehlivanoglu

    Springer 2010; US$ 139.00

    Encryption for Digital Content is an area in cryptography that is widely used in commercial productions (e.g., Blu-Ray and HD-DVDs). This book provides a comprehensive mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. A complete description of broadcast encryption with... more...