The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Linux Server Securityby Chris Binnie

    Wiley 2016; US$ 50.00

    Learn how to attack and defend the world’s most popular web server platform Linux Server Security  presents a detailed guide for experienced technical professionals seeking a more advanced understanding of Linux security tools and methods. Written by a 20-year veteran of Linux server deployment, this book provides... more...

  • Mastering the Five Tiers of Audit Competencyby Ann Butera

    CRC Press 2016; US$ 49.95

    Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits. Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing... more...

  • Penetration Testing Essentialsby Sean-Philip Oriyano

    Wiley 2016; US$ 50.00

    Becoming a professional penetration tester (or pen tester or ethical hacker) can be a major step forward in an IT security career. But before one can get the most well known professional certification for ethical hackers, you need foundational knowledge and at least 2 years of versified IT experience. Before you begin a formal career and path to certification,... more...

  • DDoS Attacksby Dhruba Kumar Bhattacharyya; Jugal Kumar Kalita

    CRC Press 2016; US$ 99.95

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces... more...

  • The Official (ISC)2 Guide to the SSCP CBKby Gordon; Steven Hernandez

    Wiley 2016; US$ 80.00

    The fourth edition of the Official (ISC) 2 Guide to the SSCP CBK is a comprehensive resource providing an in-depth look at the seven domains of the SSCP Common Body of Knowledge (CBK). This latest edition provides an updated, detailed guide that is considered one of the best tools for candidates striving to become an SSCP. The book offers... more...

  • The Official (ISC)2 Guide to the CCSP CBKby Gordon

    Wiley 2016; US$ 80.00

    Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC) 2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC) 2 Guide to the CCSP SM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step... more...

  • Policing Cyber Hate, Cyber Threats and Cyber Terrorismby Brian Blakemore; Imran Awan

    Taylor and Francis 2016; US$ 149.95

    What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities that can be defined as cyber threats. It also shows how this activity forms in our communities... more...

  • CEH v9by Raymond Blockmon

    Wiley 2016; US$ 40.00

    Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and... more...

  • Enterprise Level Securityby William R. Simpson

    CRC Press 2016; US$ 69.95

    Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived... more...

  • Moving Target Defense for Distributed Systemsby Sachin Shetty; Xuebiao Yuchi; Min Song

    Springer International Publishing 2016; US$ 99.00

    This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers. These approaches include MTD-based... more...