The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Security without Obscurityby Jeff Stapleton; W. Clay Epstein

    CRC Press 2016; US$ 69.95

    Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or... more...

  • Topics in Cryptology - CT-RSA 2016by Kazue Sako

    Springer International Publishing 2016; US$ 94.00

    Thisbook constitutes the refereed proceedings of the Cryptographer's Track at theRSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March2016. The26 papers presented in this volume were carefully reviewed and selected from 76submissions. The focus of the track is on following subjects: secure keyexchange schemes, authenticated... more...

  • Cyber Warfareby Sanjeev Relia

    Vij Books India Private Limited 2016; US$ 45.00

    This book is an attempt to understand various nuances of cyber warfare and how it affects India?s national security. Based on the cyber threat environment, the books recommends a framework of cyber doctrine and cyber strategies as well as organisational structure of various organisations which a nation needs to invest in. more...

  • The Accidental SysAdmin Handbookby Eric Kralicek

    Apress 2016; US$ 39.99

    Understand the concepts, processes and technologies that will aid in your professional development as a new system administrator. While every information technology culture is specific to its parent organization, there are commonalities that apply to all organizations. The Accidental SysAdmin Handbook, Second Edition looks at those commonalities... more...

  • iOS Forensics Cookbookby Bhanu Birani; Mayank Birani

    Packt Publishing 2016; US$ 35.99

    Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics About This Book: This book gets you straight into solving even the most complex iOS forensic problems with easy-to-understand recipes; Get to grips with extraction and analysis techniques to perform forensic investigations on iOS devices; Gain insights into... more...

  • Trusted Systemsby Moti Yung; Liehuang Zhu; Yanjiang Yang

    Springer International Publishing 2016; US$ 95.00

    Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on TrustedSystems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together... more...

  • Collaborative Computing: Networking, Applications, and Worksharingby Song Guo; Xiaofei Liao; Fangming Liu; Yanmin Zhu

    Springer International Publishing 2016; US$ 84.00

    Thisbook constitutes the thoroughly refereed proceedings of the 11th InternationalConference on Collaborative Computing: Networking, Applications, andWorksharing, CollaborateCom 2015, held in Wuhan, China, in November  2015. The 24 full papers and 8 short papers presented were carefullyreviewed and selected from numerous submissions. They... more...

  • The Psychology of Information Securityby Leron Zinatullin

    IT Governance Ltd 2016; US$ 19.95

    The Psychology of Information Security – Resolving conflicts between security compliance and human behaviour considers information security from the seemingly opposing viewpoints of security professionals and end users to find the balance between security and productivity. It provides recommendations on aligning a security programme with wider... more...

  • Advances in Parallel and Distributed Computing and Ubiquitous Servicesby James J. (Jong Hyuk) Park; Gangman Yi; Young-Sik Jeong; Hong Shen

    Springer Singapore 2016; US$ 199.00

    This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic... more...

  • Security and Privacy in Communication Networksby Bhavani Thuraisingham; XiaoFeng Wang; Vinod Yegneswaran

    Springer International Publishing 2016; US$ 131.00

    Thisvolume constitutes the thoroughly refereed post-conference proceedings of the11th International Conference on Security and Privacy in CommunicationNetworks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefullyreviewed and selected from 107 submissions. It also presents 9 papers... more...