The Leading eBooks Store Online

3,720,765 members ⚫ 1,207,593 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cybersecurity Lawby Jeff Kosseff

    Wiley 2017; US$ 115.00 US$ 99.67

    Cybersecurity is among the fastest-growing industries in the U.S., and there is great demand for an authoritative guide to cybersecurity law. Expanding on the author’s experience as a cybersecurity lawyer and law professor, this book provides a definitive guide to cybersecurity and data security law, with an in-depth analysis of U.S. and international... more...

  • Eleventh Hour CISSP®by Eric Conrad; Seth Misenar; Joshua Feldman

    Elsevier Science 2016; US$ 29.95

    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely... more...

  • Cyber Secure Development Lifecycleby Jim Whitmore

    Wiley 2017; US$ 60.00 US$ 50.99

    Cyber Secure Development Lifecycle offers an innovative approach to security that addresses both the reactive and proactive aspects of security. It engages all roles involved in the development and management of Information Technology in addressing the security challenge.  The book includes a Concepts and Models section to set the foundation... more...

  • Coding for Penetration Testersby Jason Andress; Ryan Linn

    Elsevier Science 2016; US$ 49.95

    Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing... more...

  • Privacy Risk Analysisby Sourya Joyee De; Daniel Le Métayer

    Morgan & Claypool Publishers 2016; US$ 40.00

    Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or... more...

  • IT-Sicherheitsmanagement nach der neuen ISO 27001by Heinrich Kersten; Gerhard Klett; Jürgen Reuter; Klaus-Werner Schröder

    Springer Fachmedien Wiesbaden 2016; US$ 42.08

    Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der neuen Fassung der Norm ISO/IEC 27001. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das Informationssicherheits-Managementsystem (ISMS) genauso wie die 114 Controls aus dem Anhang der Norm.... more...

  • Differential Privacyby Ninghui Li; Min Lyu; Dong Su; Weining Yang

    Morgan & Claypool Publishers 2016; US$ 40.00

    Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analysis tasks. This Synthesis Lecture is the first of two volumes on differential privacy. This lecture... more...

  • Security in Fixed and Wireless Networksby Guenter Schaefer; Michael Rossberg

    Wiley 2016; US$ 120.00 US$ 104.00

    Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms... more...

  • Gut gerüstet gegen Überwachung im Webby Johanna C. Czeschik; Matthias Lindhorst; Roswitha Jehle

    Wiley 2015; US$ 10.50 US$ 9.10

    Sie haben zwar nichts zu verbergen, mochten aber trotzdem nicht, dass irgendjemand Ihre E-Mails mitliest, Ihr Surfverhalten analysiert oder Ihre Kreditkartendaten ausspaht? Mit welchen einfachen Ma?nahmen Sie sich und Ihre Daten schutzen konnen, erfahren Sie in diesem Buch. Die Autoren zeigen Ihnen, wie Sie Ihren Browser absichern und anonym uber das... more...

  • Meeting Security Challenges through Data Analytics and Decision Supportby E. Shahbazian; G. Rogova

    IOS Press 2016; Not Available

    The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the quality of decisions and operational processes in areas such as counterterrorism and... more...