The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Verschlüsselung im NSA-Zeitalterby Carsten Eilers

    entwickler.press 2014; Not Available

    Die NSA kann manche Verschlüsselungen brechen und nimmt Einfluss auf die Entwicklung von Kryptografiestandards. Wem, oder besser: welchen Verfahren ist noch zu trauen? Und wie setzt man sie sicher ein? In den ersten beiden Kapiteln geht Carsten Eilers, freier Berater und Coach für IT-Sicherheit und technischen Datenschutz, der Frage nach, wie sicher... more...

  • Web Services Securityby Mark O'Neill

    McGraw-Hill Education 2012; US$ 55.00

    Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...

  • You: For Saleby Stuart Sumner

    Elsevier Science 2015; US$ 39.95

    Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which... more...

  • [Read Me First] Building or Buying VPNs (Digital Short Cut)by Kunjal Trivedi

    Pearson Education 2007; US$ 9.99

    [Read Me First]: Building or Buying VPNs (Digital Short Cut) Kunjal Trivedi ISBN-10: 1-58720-134-8 ISBN-13: 978-1-58720-134-9   One of the most popular approaches to establishing a secure computing and network environment is the virtual private network (VPN), which enables organizations to use Internet transport securely to... more...

  • c't wissen Überwachung abwehren (2015)by c't-Redaktion

    Heise Medien 2015; Not Available

    Wer digital kommuniziert, macht Unbefugten den Zugriff auf die eigene Privatsphäre oft unnötig leicht. "c't wissen Überwachung abwehren" erklärt konkret, wo bei E-Mail, Messenger, Social Media und Telefonie die Gefahren lauern. Das Praxishandbuch zeigt, wie man schnüffelnde Zeitgenossen mit alltagstauglichen Mitteln auf Abstand hält. Aus... more...

  • ASP.NET Web API Security Essentialsby Rajesh Gunasundaram

    Packt Publishing 2015; US$ 27.99

    Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around About This Book: This book has been completely updated for ASP.NET Web API 2.0 including the new features of ASP.NET Web API such as Cross-Origin Resource Sharing (CORS) and OWIN self-hosting; Learn various techniques to secure ASP.NET... more...

  • Analyzing Computer Securityby Charles P. Pfleeger; Shari Lawrence Pfleeger

    Pearson Education 2011; US$ 91.99

    ?In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today?s cybersecurity challenges. Their use of the threat?vulnerability?countermeasure paradigm combined with extensive real-world examples throughout results in a very effective... more...

  • Anti-Hacker Tool Kit, Third Editionby Mike Shema; Chris Davis; Aaron Philipp; David Cowen

    McGraw-Hill Education 2006; US$ 59.99

    Completely revised to include the latest security tools, including wireless tools New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more New case studies... more...

  • Cloud Security and Privacyby Tim Mather; Subra Kumaraswamy; Shahed Latif

    O'Reilly Media 2009; US$ 27.99

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...

  • Cyber Hackingby Scientific American Editors

    Scientific American 2013; US$ 5.99

    Cyber Hacking: Wars in Virtual Space by the editors of Scientific American Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door... more...