The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • VoIP and PBX Security and Forensicsby

    Springer International Publishing 2016; US$ 54.99

    This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness... more...

  • IBM i Security Administration and Complianceby Carol Woodbury

    MC Press 2016; US$ 70.99

    In this long-awaited update to IBM i Security Administration and Compliance, security expert Carol Woodbury tells you everything you need to know about IBM i security. Written in a clear, jargon-free style, this book explains the importance of developing a security policy and gives detailed guidance on how to implement and maintain such a system. more...

  • Critical Information Infrastructures Securityby Erich Rome; Marianthi Theocharidou; Stephen Wolthusen

    Springer International Publishing 2016; US$ 72.00

    This book constitutesrevised selected papers from the 10th International Conference on CriticalInformation Infrastructures Security, CRITIS 2015, held in Berlin, Germany, inOctober 2015. The 18 full and 6short papers presented in this volume were carefully reviewed and selected from54 submissions. They are organized in topical sections named: critical... more...

  • Advances in Cryptology ? EUROCRYPT 2016by Marc Fischlin; Jean-Sébastien Coron

    Springer Berlin Heidelberg 2016; Not Available

    The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.  The 62 full papers included in these volumes were carefully reviewed and selected from 274... more...

  • Advances in Cryptology ? EUROCRYPT 2016by Marc Fischlin; Jean-Sébastien Coron

    Springer Berlin Heidelberg 2016; US$ 155.00

    The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes werecarefully reviewed and selected from 274 submissions.... more...

  • Nine Steps to Successby Alan Calder

    IT Governance Ltd 2016; US$ 37.95

    Aligned with the latest iteration of the Standard – ISO 27001:2013 – this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language more...

  • Threat Forecastingby John Pirc; David DeSanto; Iain Davison; Will Gragido

    Elsevier Science 2016; US$ 59.95

    Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting... more...

  • Cyber Security Cultureby Peter Trim; David Upton

    Taylor and Francis 2016; US$ 149.95

    Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational... more...

  • ICT Systems Security and Privacy Protectionby Jaap-Henk Hoepman; Stefan Katzenbeisser

    Springer International Publishing 2016; US$ 131.00

    This book constitutes the refereed proceedings of the 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2016, held in Ghent, Belgium, in May/June 2016. The 27 revised full papers presented were carefully reviewed and selected from 139 submissions. The papers are organized in topical sections on cryptographic... more...

  • Ethics in Computingby Joseph Migga Kizza

    Springer International Publishing 2016; US$ 49.99

    Thistextbook raises thought-provoking questions regarding our rapidly-evolvingcomputing technologies, highlighting the need for a strong ethical framework inour computer science education. Ethicsin Computing offers a concise introduction to this topic, distilled fromthe more expansive Ethical and SocialIssues in the Information Age . Features: introduces... more...