The Leading eBooks Store Online

3,834,764 members ⚫ 1,265,029 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Informationelle Selbstbestimmung im digitalen Wandelby Michael Friedewald; Jörn Lamla; Alexander Roßnagel

    Springer Fachmedien Wiesbaden 2017; US$ 42.37

    Die Autoren des Buches untersuchen die historische und sachliche Bedingtheit des Konzepts der informationellen Selbstbestimmung, das zum Zweck des Persönlichkeitsschutzes in der modernen Datenverarbeitung zu einer Zeit und für Umstände entwickelt wurde, die inzwischen längst überholt sind. Thematisiert werden seine auch in absehbarer Zukunft erhaltenswerten... more...

  • Hacking the Hackerby Roger A. Grimes

    Wiley 2017; US$ 25.00 US$ 21.99

    Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers,... more...

  • Summary and Analysis of Dark Territory: The Secret History of Cyber Warby Worth Books

    Worth Books 2017; US$ 3.50

    So much to read, so little time? This brief overview of Dark Territory: The Secret History of Cyber War tells you what you need to know?before or after you read Fred Kaplan?s book. Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to be a well-informed reader.   This short summary and analysis... more...

  • Safety of Web Applicationsby Eric Quinton

    Elsevier Science 2017; US$ 130.00

    Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based... more...

  • CompTIA Cybersecurity Analyst (CSA+) Study Guideby Michael J. Chapple; David Seidl

    Wiley 2017; US$ 60.00 US$ 52.99

    Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal... more...

  • Cyber Security and Policyby Andrew Colarik

    Massey University Press 2017; US$ 11.99

    A world without the advantages and convenience provided by cyberspace and the internet of things is now unimaginable. But do we truly grasp the threats to this massive, interconnected system? And do we really understand how to secure it? After all, cyber security is no longer just a technology problem; the effort to secure systems and society are now... more...

  • Defensive Security Handbookby Lee Brotherston; Amanda Berlin

    O'Reilly Media 2017; US$ 33.99

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don?t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools,... more...

  • Information Security Policies, Procedures, and Standardsby Douglas J. Landoll

    CRC Press 2017; US$ 69.95

    Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology,... more...

  • Blackstone's Handbook of Cyber Crime Investigationby Andrew Staniforth; Police National Legal Database (PNLD); Babak Akhgar; Francesca Bosco

    OUP Oxford 2017; US$ 62.99

    A comprehensive and practical guide to the police investigation of cyber crime offering an overview of the national strategies and structures, a strand-by-strand treatment of the different types of cyber crime, and the relevant laws, police powers, and investigative tools. more...

  • IT-Sicherheitsanalysenby Daniela Simic

    De Gruyter 2017; US$ 114.99

    Die etablierten Verfahren zur Durchführung von IT-Sicherheitsanalysen beziehen sich im Regelfall auf technische Systeme. Dieses Vorgehen ist mit einem vertretbaren Aufwand möglich, solange es sich hierbei nur um wenige bzw. eindeutig abzugrenzende IT-Systeme handelt. Herausforderungen treten jedoch dann auf, wenn eine Organisation bzw. die unterstützenden... more...