The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cyber Hackingby Scientific American Editors

    Scientific American 2013; US$ 3.99

    Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door to security threats undreamed of in previous generations. In this eBook, we... more...

  • Intelligent Systems for Security Informaticsby Christopher C Yang; Wenji Mao; Xiaolong Zheng; Hui Wang

    Elsevier Science 2013; US$ 125.00

    The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and... more...

  • Take Control of Your Passwordsby Joe Kissell

    TidBITS 2014; US$ 10.00

    Overcome password frustration with Joe Kissell's expert advice! Updated January 24, 2014 Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic. Read the book to understand the problems... more...

  • Glass Housesby Joel Brenner

    Penguin Group US 2013; US$ 9.99

    A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at... more...

  • Information Security The Complete Reference, Second Editionby Mark Rhodes-Ousley

    McGraw-Hill Education 2013; US$ 70.00

    Develop and implement an effective end-to-end security program Today?s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference ) is the only comprehensive... more...

  • Active Directory Cookbookby Brian Svidergol; Robbie Allen

    O'Reilly Media 2013; US$ 50.99

    Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft?s network directory service. This fourth edition includes... more...

  • Web Services Securityby Mark O'Neill

    McGraw-Hill Education 2003; US$ 55.00

    Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...

  • Network and System Securityby John R. Vacca

    Elsevier Science 2013; US$ 59.95

    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise. Coverage... more...

  • Managing Information Securityby John R. Vacca

    Elsevier Science 2013; US$ 49.95

    Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage... more...

  • The Re-Evolution of American Street Gangsby Mohamad Khatibloo; Gregorio Estevane; Dale L. June

    Taylor and Francis 2015; US$ 79.95

    Addressing the intricacies and diversities of street gangs, a major and growing blight across the country, this book draws on the expertise of high-ranking law enforcement officials monitoring terrorist activity and gang-related crimes as well as professional private investigators who have spent several decades investigating gangs and learning their... more...