The Leading eBooks Store Online

3,629,807 members ⚫ 1,172,494 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Executing Windows Command Line Investigationsby Chet Hosmer; Joshua Bartolomie; Rosanne Pelli

    Elsevier Science 2016; US$ 69.95

    The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal... more...

  • Cyber Guerillaby Jelle Van Haaster; Rickey Gevers; Martijn Sprengers

    Elsevier Science 2016; US$ 49.95

    Much as Che Guevara?s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well... more...

  • Audio Content Securityby Sogand Ghorbani; I.S. Amiri

    Elsevier Science 2016; US$ 69.95

    Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and... more...

  • Cybersecurity Lawby Jeff Kosseff

    Wiley 2017; US$ 115.00 US$ 99.67

    Cybersecurity is among the fastest-growing industries in the U.S., and there is great demand for an authoritative guide to cybersecurity law. Expanding on the author’s work in big data and analytics, this book provides a definitive guide to cybersecurity and data security law, with an in-depth analysis of U.S. and international laws that apply... more...

  • Hacking Wireless Networks For Dummiesby Kevin Beaver; Peter T. Davis; Devin K. Akin

    Wiley 2011; US$ 34.99 US$ 27.99

    Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd... more...

  • Cleaning Windows Vista For Dummiesby Allen Wyatt

    Wiley 2007; US$ 21.99 US$ 17.59

    Find out what you should clean, when, and how Dump programs you don't need, archive data, and bring order to your desktop Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning tools that help you organize your data and e-mail, archive... more...

  • SUSE LINUX Enterprise Server 9 Administrator's Handbookby Peter Kuo; Jacques Beland

    Pearson Education 2005; US$ 39.99

    As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through... more...

  • Engineering Methods and Tools for Software Safety and Securityby M. Broy; W. Sitou; T. Hoare

    IOS Press 2009; US$ 174.00

    As a consequence of the wide distribution of software and software infrastructure, information security and safety depend on the quality and excellent understanding of its functioning. Only if this functionality is guaranteed as safe, customer and information are protected against adversarial attacks and malfunction. A vast proportion of information... more...

  • Securing Information and Communications Systemsby Javier Lopez; Steven Furnell; Sokratis Katsikas; Ahmed Patel

    Artech House 2008; US$ 131.00

    This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed... more...

  • Fuzzing for Software Security Testing and Quality Assuranceby Ari Takanen; Jared D. DeMott; Charles Miller

    Artech House 2008; US$ 79.00

    This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there... more...