The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • 125 sposobów na bezpiecze?stwo sieci. Wydanie IIby Andrew Lockhart

    Helion 2007; US$ 15.00

    Praktyczny przewodnik po technikach zabezpieczania sieci komputerowych Jak sprawnie zabezpieczy? system? Jak zapewni? sobie prywatno?? w internecie? Jak skutecznie walczy? z sieciowymi w?amywaczami? W naszych domach montujemy solidne zamki i drzwi, chronimy samochody wymy?lnymi alarmami, w firmach zak?adamy systemy monitoringu,... more...

  • Active Cyber Defenseby Robert Lee

    Wiley 2016; US$ 60.00

    Countering flexible and persistent adversaries requires empowered defenders The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single holistic strategy. Written by a renowned cyber defense expert, this book draws on the author's military and intelligence career complemented with his time in private... more...

  • Active Directory Cookbookby Brian Svidergol; Robbie Allen

    O'Reilly Media 2013; US$ 50.99

    Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft?s network directory service. This fourth edition includes... more...

  • Advances in Information and Computer Securityby Maki Yoshida; Koichi Mouri

    Springer International Publishing 2014; US$ 72.00

    This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security,... more...

  • Angriffsziel UIby Carsten Eilers

    entwickler.press 2015; Not Available

    Das User Interface, auf dem Benutzeraktionen und -eingaben, beispielsweise zur Authentifizierung auf einer Webseite, getätigt werden, ist ein beliebtes Ziel für Cyberkriminelle, um Zugangsdaten zu erlangen. Das erste Kapitel dieses shortcuts befasst sich mit so genannten Logikfehlern, durch die sich Webanwendungen in bestimmten Situationen anders verhalten... more...

  • Archiwizacja i odzyskiwanie danychby W. Curtis Preston

    Helion 2008; US$ 23.99

    Optymalizacja procesu archiwizacji dla administratorów i nie tylko Jak archiwizowa? i odtwarza? system oraz dane? Jak wybra? optymaln? metod? archiwizacji? Jak ograniczy? koszty zwi?zane z procesem archiwizacji? Wdro?enie systemu archiwizacji jest podstawow? czynno?ci?, jak? administrator powinien wykona?. Cel tej procedury jest oczywisty,... more...

  • Artificial Intelligence and Security in Computing Systemsby Jerzy Soldek; Leszek Drobiazgiewicz

    Springer US 2012; US$ 189.00

    Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems... more...

  • Aspect-Oriented Security Hardening of UML Design Modelsby Djedjiga Mouheb; Mourad Debbabi; Makan Pourzandi; Lingyu Wang; Mariam Nouh; Raha Ziarati; Dima Alhadidi; Chamseddine Talhi; Vitor Lima

    Springer International Publishing 2015; US$ 109.00

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been... more...

  • Breaking into Information Securityby Josh More; Anthony J. Stieber; Chris Liu

    Elsevier Science 2015; US$ 39.95

    Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.... more...

  • Broadband Quantum Cryptographyby Daniel Rogers

    Morgan & Claypool Publishers 2010; US$ 35.00

    Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for... more...