The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Cyber Reconnaissance, Surveillance and Defenseby Robert Shimonski

    Elsevier Science 2014; US$ 59.95

    At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows... more...

  • Mastering Nmap Scripting Engineby Paulino Calderón Pale

    Packt Publishing 2014;

    A complete guide with code snippets and real-world examples of tasks required during NSE development.Each chapter covers an important aspect of NSE and its related scan tasks. The book also includes full explanations of scripts to help you fully understand their functionality.The book takes a ground-up approach to introducing you to NSE development.... more...

  • CASP CompTIA Advanced Security Practitioner Study Guideby Michael Gregg

    Wiley 2014; US$ 59.99

    CompTIA-approved, best-selling prep for CompTIA's Advanced Security Practitioner certification, updated for the CAS-002 exam CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certification exam. CompTIA approved, this guide covers all of the CASP exam objectives with... more...

  • Hardware Securityby Debdeep Mukhopadhyay; Rajat Subhra Chakraborty

    Taylor and Francis 2014; US$ 89.95

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very... more...

  • Physical Security and Safetyby Truett A. Ricks; Bobby E. Ricks; Jeffrey Dingle

    Taylor and Francis 2014; US$ 89.95

    How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss... more...

  • American Volunteer Police: Mobilizing for Securityby Martin Alan Greenberg

    Taylor and Francis 2014; US$ 79.95

    Today, it is estimated there are over 200,000 volunteers in police work throughout the United States. Although the need for such volunteers has never been greater, there is a lack of published materials regarding the nature of volunteer police work and how qualified citizens may augment police services. American Volunteer Police: Mobilizing for Security... more...

  • Informants, Cooperating Witnesses, and Undercover Investigationsby Dennis G. Fitzgerald

    Taylor and Francis 2014; US$ 79.95

    The use of informants has been described as the "black hole of law enforcement." Failures in the training of police officers and federal agents in the recruitment and operation of informants has undermined costly long-term investigations, destroyed the careers of prosecutors and law enforcement officers, and caused death and serious injuries to... more...

  • Detecting and Combating Malicious Emailby Julie JCH Ryan; Cade Kamachi

    Elsevier Science 2014; US$ 29.95

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which... more...

  • Android Malware and Analysisby Ken Dunham

    Taylor and Francis 2014; US$ 59.95

    The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware threats and analysis. In Android Malware and Analysis... more...

  • Police Investigative Interviews and Interpretingby Sedat Mulayim; Miranda Lai; Caroline Norma

    Taylor and Francis 2014; US$ 69.95

    Police interviews with suspects and witnesses provide some of the most significant evidence in criminal investigations. Frequently challenging, they require special training and skills. This interaction process is further complicated when the suspect or witness does not speak the same language as the interviewer. A professional reference that can... more...