The Leading eBooks Store Online

4,034,055 members ⚫ 1,328,001 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Intelligence-Driven Incident Responseby Scott J Roberts; Rebekah Brown

    O'Reilly Media 2017; US$ 50.99

    Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you’ll learn the... more...

  • Security and Privacy in Cyber-Physical Systemsby Houbing Song; Glenn A. Fink; Sabina Jeschke

    Wiley 2017; US$ 115.00 US$ 103.50

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and... more...

  • Privacy and Personalityby Russell L. Ciochon

    Taylor and Francis 2017; US$ 44.95

    Like many concepts, privacy has a commonly accepted core of meaning with an indefinite or variable periphery. Some would wish to enlarge the core. It would be pointless to attempt to establish a definition by way of introduction to a series of essays that themselves provide no single definition. But the themes of freedom, justice, rational choice,... more...

  • CompTIA CSA+ Study Guideby Mike Chapple; David Seidl

    Wiley 2017; US$ 60.00 US$ 52.99

    Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal... more...

  • Data Security in Cloud Computingby Vimal Kumar; Sivadon Chaisiri; Ryan Ko

    The Institution of Engineering and Technology 2017; US$ 160.00

    This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management. more...

  • Cybersecurity Lawby Jeff Kosseff

    Wiley 2017; US$ 115.00 US$ 103.50

    A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance,... more...

  • Fundamentals of Information Security Risk Management Auditingby Christopher Wright

    IT Governance Ltd 2016; US$ 19.95

    An introductory guide to information risk management auditing, giving an interesting and useful insight into the risks and controls/mitigations that you may encounter when performing or managing an audit of information risk. Case studies and chapter summaries impart expert guidance. more...

  • Collaborative Cyber Threat Intelligenceby Florian Skopik

    CRC Press 2017; US$ 79.95

    Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single organizations only. This book provides a unique... more...

  • Hacking Wireless Networks For Dummiesby Kevin Beaver; Peter T. Davis; Devin K. Akin

    Wiley 2011; US$ 34.99 US$ 30.99

    Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd... more...

  • SUSE LINUX Enterprise Server 9 Administrator's Handbookby Peter Kuo; Jacques Beland

    Pearson Education 2005; US$ 39.99

    As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through... more...