The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

  • PCI DSS: A Pocket Guide, fourth editionby Alan Calder; Geraint Williams

    IT Governance Ltd 2015; Not Available

    Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing.  more...

  • Thinking Securityby Steven M. Bellovin

    Pearson Education 2015; US$ 31.99

    If you?re a security or network professional, you already know the ?do?s and don?ts?: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn?t working. You?re at greater risk than ever, and even the world?s most security-focused organizations... more...

  • The Official (ISC)2 Guide to the CCSP CBKby Gordon

    Wiley 2015; US$ 80.00

    Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC) 2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC) 2 Guide to the CCSP SM CBK is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through... more...

  • Security for Web Developersby John Paul Mueller

    O'Reilly Media 2015; US$ 42.99

    As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You?ll learn how to help protect your app no matter where it runs,... more...

  • Police Corruption in the NYPDby Steven V. Gilbert; Barbara A. Gilbert

    CRC Press 2015; US$ 69.95

    Police Corruption in the NYPD: From Knapp to Mollen explores how the New York Police Department experienced two major investigations within a quarter of a century. It compares the states of corruption within the NYPD during the Knapp and Mollen commissions, examining why corruption continued and why the revealed ethical breaches became more serious.... more...

  • A Study of Black Hole Attack Solutionsby Elahe Fazeldehkordi; I.S. Amiri; Oluwatobi Ayodeji Akanbi

    Elsevier Science 2015; US$ 69.95

    Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in... more...

  • Thor's OS Xodusby Timothy "Thor" Mullen

    Elsevier Science 2015; US$ 59.95

    Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete... more...

  • Collaborative Policingby Peter C. Kratcoski; Maximilian Edelbacher

    CRC Press 2015; US$ 99.95

    "The chapters in this book reveal that police education, training, and practices are now closely tied to collaboration between police, academics, professional practitioners, and community agencies, and such collaboration is described and evaluated." ?Dilip K. Das, PhD, Founding President, International Police Executive Symposium (IPES) and founding... more...

  • Logistics and Transportation Securityby Maria G. Burns

    CRC Press 2015; US$ 69.95

    "Professor Burns has captured the essence of transportation security, one of today's most pressing concerns. As the rate of globalization and world trade increases, security and supply chain resilience are at the core of one?s global transportation network. This is a timely and well written contribution to the industry." ?John A. Moseley, Senior Director... more...

  • Leading the Internal Audit Functionby Lynn Fountain

    CRC Press 2015; US$ 69.95

    While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF) , internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to balance the requirements of the IPPF with management expectations.... more...