The Leading eBooks Store Online

3,757,227 members ⚫ 1,221,934 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Selling Information Security to the Boardby Alan Calder

    IT Governance Ltd 2016; US$ 14.95

    This pocket guide will help you with the essential sales skills that, persuade company directors to commit money and resources to your information security initiatives. more...

  • Cyber-Assurance for the Internet of Thingsby Tyson T. Brooks

    Wiley 2016; US$ 125.00 US$ 108.33

    Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners... more...

  • Insider Threatby Julie Mehan

    IT Governance Ltd 2016; US$ 54.95

    Insider Threat ? A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. more...

  • Cyber Guerillaby Jelle Van Haaster; Rickey Gevers; Martijn Sprengers

    Elsevier Science 2016; US$ 49.95

    Much as Che Guevara?s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well... more...

  • Audio Content Securityby Sogand Ghorbani; Iraj Sadegh Amiri

    Elsevier Science 2016; US$ 69.95

    Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and... more...

  • Cybersecurity Lawby Jeff Kosseff

    Wiley 2017; US$ 115.00 US$ 99.67

    A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement... more...

  • Security in Fixed and Wireless Networksby Guenter Schaefer; Michael Rossberg

    Wiley 2016; US$ 120.00 US$ 104.00

    Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms... more...

  • Eleventh Hour CISSP®by Eric Conrad; Seth Misenar; Joshua Feldman

    Elsevier Science 2016; US$ 29.95

    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely... more...

  • Cyber Secure Development Lifecycleby Jim Whitmore

    Wiley 2017; US$ 60.00 US$ 52.99

    Cyber Secure Development Lifecycle offers an innovative approach to security that addresses both the reactive and proactive aspects of security. It engages all roles involved in the development and management of Information Technology in addressing the security challenge.  The book includes a Concepts and Models section to set the foundation... more...

  • Coding for Penetration Testersby Jason Andress; Ryan Linn

    Elsevier Science 2016; US$ 49.95

    Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing... more...