The Leading eBooks Store Online

4,034,055 members ⚫ 1,328,001 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Applied Cryptographyby Bruce Schneier

    Wiley 2017; US$ 70.00 US$ 61.50

    From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about... more...

  • Malicious Mobile Codeby Roger A. Grimes

    O'Reilly Media 2001; US$ 38.99

    Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, and certainly not through email exchange. The Melissa virus and the Love Bug proved... more...

  • Datensicherheitby Thomas H. Lenhard

    Springer Fachmedien Wiesbaden 2017; US$ 22.82

    Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein untrennbarer Teil des Datenschutzes, der mehr und mehr in unserer Gesellschaft... more...

  • Digital Privacy and Security Using Windowsby Nihad Hassan; Rami Hijazi

    Apress 2017; US$ 38.97

    Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your... more...

  • Das IT-Gesetz: Compliance in der IT-Sicherheitby Ralf-T. Grünendahl; Andreas F. Steinbacher; Peter H.L. Will

    Springer Fachmedien Wiesbaden 2017; US$ 46.65

    Das Buch richtet sich an Führungskräfte und Sicherheitsbeauftragte, die vor der Aufgabe stehen, Regelungen zur IT-Sicherheit für ihr Unternehmen zu definieren. Dieses Buch liefert dazu eine konkrete Anleitung. Es basiert auf internationalen Standards wie BSI Grundschutz-Handbuch, Cobit und ITIL. more...

  • Strategic Cyber Defenseby A.V. Gheorghe; U. Tatar; Y. Gokce

    IOS Press 2017; Not Available

    With the increased dependence on digital and internet technologies, cyber security has come to be regarded as a national security issue, and the number of countries with a published cyber security strategy continues to rise. But these national cyber security strategies often run the risk of failing to address all the cyber security requirements of... more...

  • Computação Segura é Como Sexo Seguro: Você tem que praticar para evitar infecçõesby Richard G Lowe Jr; Magno Cruz

    The Writing King 2017; US$ 5.00

    Proteja o Seu Computador e as Suas Informações e Fotos Importantes Sem Precisar Gastar Muito ou Contratar Um Especialista. E se alguns novos hábitos pudessem reduzir dramaticamente as chances do seu sistema ser infectado por um vírus ou atacado por um hacker? Imagine navegar na internet sem se preocupar com o terror da fraude de cartão de crédito ou... more...

  • La sicurezza informatica è come il sesso sicuro bisogna metterli in pratica per evitare le infezioniby Richard G Lowe Jr; Cristina Puppo

    The Writing King 2017; US$ 7.00

    Proteggete il vostro computer, le vostre informazioni di valore e le foto senza dilapidare il budget o pagare un esperto. Che cosa succede se un paio di nuove abitudini riducono drasticamente le possibilità del sistema di essere infettato da un virus o attaccato da un hacker? Immaginate la navigazione sul web senza preoccuparvi del terrore delle frodi... more...

  • La seguridad informática es como el sexo seguroby Richard G Lowe Jr; Sergio Yagüe-Pasamón

    The Writing King 2017; US$ 7.00

    Proteja su ordenador, sus fotos y su información más valiosa sin salirse del presupuesto o tener que contratar a un experto.¿Y que me diría si le digo que unos pocos hábitos innovadores podrían reducir las probabilidades de que un virus infecte su equipo o ser víctima de un pirata informático? Imagine cómo sería navegar por la web sin tener que preocuparse... more...

  • Intelligence-Driven Incident Responseby Scott J Roberts; Rebekah Brown

    O'Reilly Media 2017; US$ 50.99

    Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you’ll learn the... more...