The Leading eBooks Store Online

4,416,707 members ⚫ 1,552,143 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cryptography: A Very Short Introductionby Fred Piper; Sean Murphy

    OUP Oxford 2002; US$ 7.99

    A clear and informative introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. more...

  • Accumuloby Aaron Cordova; Billie Rinaldi; Michael Wall

    O'Reilly Media 2015; US$ 42.99

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.... more...

  • CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guideby Charles L. Brooks

    McGraw-Hill Education 2014; US$ 50.00

    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative... more...

  • SSH, The Secure Shell: The Definitive Guideby Daniel J. Barrett; Richard E. Silverman; Robert G. Byrnes

    O'Reilly Media 2005; US$ 35.99

    Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every... more...

  • Spring Security 3by Peter Mularien

    Packt Publishing 2010; US$ 29.99

    Secure your web applications against malicious intruders with this easy to follow practical guide more...

  • Windows Performance Analysis Field Guideby Clint Huffman

    Elsevier Science 2014; US$ 49.95

    Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts... more...

  • Verification of Infinite-State Systems with Applications to Securityby E. Clarke; M. Minea; F.L. Tiplea

    IOS Press 2006; US$ 168.00

    The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point... more...

  • Trust Managementby Sandro Etalle; Stephen Marsh

    Springer US 2007; US$ 125.37

    This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology... more...

  • An Introduction to Information Security and ISO 27001by Steve G. Watkins

    IT Governance Publishing 2008; US$ 14.95

    This new pocket guide will suit both individuals who need an introduction to a topic that they know little about, and also organizations implementing, or considering implementing, some sort of information security management regime, particularly if using ISO/IEC 27001:2005 more...

  • Security Engineeringby Ross J. Anderson

    Wiley 2010; US$ 85.00 US$ 76.50

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems... more...