The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Network Security Through Data Analysisby Michael S Collins

    O'Reilly Media 2014; US$ 42.99

    Traditional intrusion detection and logfile analysis are no longer enough to protect today?s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You?ll understand how your network is used, and what actions are necessary to protect... more...

  • Network Securityby BRAGG

    McGraw-Hill Education 2012; US$ 70.00

    Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more. more...

  • Official (ISC)2 Guide to the CISSP CBK, Fourth Editionby Adam Gordon

    Taylor and Francis 2015; US$ 79.95

    This book presents material that has been prepared by CISSP credential holders and reviewed by (ISC) authorized instructors who are highly knowledgeable about the latest information security-related developments and are proven experts in the CISSP common body of knowledge (CBK). Endorsed by the (ISC), the Official (ISC) 2 Guide to the CISSP ... more...

  • Biometrics in the New Worldby Julian Ashbourn

    Springer 2014; US$ 69.99

    This book takes a fresh look at biometrics and identity management, extending the dialogue beyond technical considerations, and exploring some of the broader societal and philosophical aspects surrounding the use of biometric applications. Features: presents a brief history of the development of biometrics, and describes some of the popularly held... more...

  • QC-LDPC Code-Based Cryptographyby Marco Baldi

    Springer 2014; US$ 54.99

    This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several... more...

  • Healthcare Information Privacy and Securityby Bernard Peter Robichau

    Springer 2014; US$ 34.99

    Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed.... more...

  • Security Testing Handbook for Banking Applicationsby Arvind Doraiswamy; Sangita Pakala; Nilesh Kapoor; Prashant Verma; Praveen Singh; Raghu Nair; Shalini Gupta

    IT Governance Ltd 2009; US$ 60.00

    The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field. more...

  • Managing Information Riskby Stewart Mitchell

    IT Governance Ltd 2009; US$ 18.50

    Addressing the scope of risks involved in a modern IT system, this pocket guide outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Since no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview... more...

  • IM Instant Messaging Securityby John CISM PhD Rittinghouse; James F. CISSP CISM PhD Ransome

    Elsevier Science 2005; US$ 84.95

    BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...

  • Hacking Exposed: Malware and Rootkitsby Michael Davis; Sean Bodmer; Aaron LeMasters

    McGraw-Hill Education 2009; US$ 57.00

    "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project... more...