The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Database Anonymizationby Josep Domingo-Ferrer; David Sánchez; Jordi Soria-Comas

    Morgan & Claypool Publishers 2016; US$ 36.00

    The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the data refer... more...

  • Automated Security Analysis of Android and iOS Applications with Mobile Security Frameworkby Henry Dalziel; Ajin Abraham

    Elsevier Science 2015; US$ 39.95

    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators... more...

  • Introduction to Secure Outsourcing Computationby Xiaofeng Chen

    Morgan & Claypool Publishers 2016; US$ 32.00

    With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive... more...

  • Windows Registry Forensicsby Harlan Carvey

    Elsevier Science 2016; US$ 69.95

    Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition , provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as... more...

  • Fundamentals of Information Security Risk Management Auditingby Christopher Wright

    IT Governance Ltd 2016; US$ 19.95

    An introductory guide to information risk management auditing, giving an interesting and useful insight into the risks and controls/mitigations that you may encounter when performing or managing an audit of information risk. Case studies and chapter summaries impart expert guidance. more...

  • Nine Steps to Successby Alan Calder

    IT Governance Ltd 2016; US$ 37.95

    Aligned with the latest iteration of the Standard – ISO 27001:2013 – this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language more...

  • Selling Information Security to the Boardby Alan Calder

    IT Governance Ltd 2016; US$ 14.95

    This pocket guide will help you with the essential sales skills that, persuade company directors to commit money and resources to your information security initiatives. more...

  • Cyber-Assurance for the Internet of Thingsby Tyson Brooks

    Wiley 2016; US$ 120.00

    The goal of this book is to present an information assurance (IA) approach to the Internet of Things (IoT). From an information security/IA perspective, the IoT must address the delivery of authentic, accurate, secure, reliable, timely information, regardless of threat conditions, over the distributed and heterogeneous computing and communication... more...

  • OS X Incident Responseby Jaron Bradley

    Elsevier Science 2016; US$ 59.95

    OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly... more...

  • HTML5 Securityby Carsten Eilers

    Developer press 2012; Not Available

    HTML5 is not just the latest version of HTML, but also includes a variety of JavaScript APIs. This makes it possible to develop very powerful web clients, but also the cybercriminals benefit from the new opportunities. That's what this book is all about: What new attacks are possible, and how can they be prevented.   Biographische Informationen... more...