The Leading eBooks Store Online

4,063,245 members ⚫ 1,337,215 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Hacking Exposed 7by Stuart McClure; Joel Scambray; George Kurtz

    McGraw-Hill Education 2012; US$ 50.00

    The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for... more...

  • The Basics of Hacking and Penetration Testingby Patrick Engebretson

    Elsevier Science 2013; US$ 29.95

    The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides... more...

  • Nmap Essentialsby David Shaw

    Packt Publishing 2015; US$ 19.99

    This book is for beginners who wish to start using Nmap, who have experience as a system administrator or of network engineering, and who wish to get started with Nmap. more...

  • Modern Cryptography: Applied Mathematics for Encryption and Information Securityby Chuck Easttom

    McGraw-Hill Education 2015; US$ 60.00

    This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical... more...

  • Digital Identityby Phillip J. Windley

    O'Reilly Media 2005; US$ 27.99

    The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted... more...

  • Informants, Cooperating Witnesses, and Undercover Investigationsby Dennis G. Fitzgerald

    CRC Press 2014; US$ 83.95

    The use of informants has been described as the "black hole of law enforcement." Failures in the training of police officers and federal agents in the recruitment and operation of informants has undermined costly long-term investigations, destroyed the careers of prosecutors and law enforcement officers, and caused death and serious injuries to... more...

  • Information Security Management Principlesby Andy Taylor; David Alexander; Amanda Finch; David Sutton; Andy Taylor

    BCS Learning & Development Limited 2013; US$ 39.99

    In today’s technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources. more...

  • Verification of Infinite-State Systems with Applications to Securityby E. Clarke; M. Minea; F.L. Tiplea

    IOS Press 2006; US$ 168.00

    The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point... more...

  • Trust Managementby Sandro Etalle; Stephen Marsh

    Springer US 2007; US$ 134.20

    This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology... more...

  • An Introduction to Information Security and ISO 27001by Steve G. Watkins

    IT Governance Publishing 2008; US$ 14.95

    This new pocket guide will suit both individuals who need an introduction to a topic that they know little about, and also organizations implementing, or considering implementing, some sort of information security management regime, particularly if using ISO/IEC 27001:2005 more...