The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Unimodal and Multimodal Biometric Data Indexingby Somnath Dey; Debasis Samanta

    De Gruyter 2014; US$ 94.95

    This work is on biometric data indexing for large-scale identification systems with a focus on different biometrics data indexing methods. It provides state-of-the-art coverage including different biometric traits, together with the pros and cons for each. Discussion of different multimodal fusion strategies are also included. more...

  • Targeted Cyber Attacksby Aditya Sood; Richard Enbody

    Elsevier Science 2014; US$ 29.95

    Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering... more...

  • Gitolite Essentialsby Sitaram Chamarty

    Packt Publishing 2014; US$ 17.99

    The book is written to suit an easy-reading style, using typical problems in access control to illustrate the need for each Gitolite feature explained. This book is for system administrators or development managers who need to keep a lid on Git-based development workflows. Basic knowledge of Git as well as of the Unix shell is helpful. more...

  • Kali Linuxby Shakeel Ali; Tedi Heriyanto; Lee Allen

    Packt Publishing 2014; US$ 26.99

    Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If... more...

  • Anonymous Communication Networksby Kun Peng

    Taylor and Francis 2014; US$ 79.95

    In today?s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage,... more...

  • A Cryptography Primerby Philip N. Klein

    Cambridge University Press 2014; US$ 26.00

    This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs. more...

  • Cryptography and Secure Communicationby Richard E. Blahut

    Cambridge University Press 2014; US$ 79.00

    This fascinating book presents the timeless mathematical theory underpinning cryptosystems both old and new, written specifically with engineers in mind. more...

  • The NSA Reportby The President's Review Group on Intelligence and Communications Technologies; Richard A. Clarke; Michael J. Morell; Geoffrey R. Stone; Cass R. Sunstein; Peter Swire

    Princeton University Press 2014; US$ 9.95

    "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."-- The NSA Report... more...

  • Learning Pentesting for Androidby Aditya Gupta

    Packt Publishing 2014; US$ 17.99

    This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get started in Android security or Android application... more...

  • Computer-Forensik (iX Edition)by Alexander Geschonneck

    dpunkt.verlag 2014; US$ 39.33

    Unternehmen und Behörden schützen ihre IT-Systeme mit umfangreichen Sicherheitsmaßnahmen. Trotzdem werden diese Systeme immer wieder für kriminelle Zwecke missbraucht bzw. von böswilligen Hackern angegriffen. Nach solchen Vorfällen will man erfahren, wie es dazu kam, wie folgenreich der Einbruch ist, wer der Übeltäter war und wie man ihn zur Verantwortung... more...