The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Elsevier Science 2006; US$ 51.95
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...
- Elsevier Science 2006; US$ 51.95
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section... more...
- O'Reilly Media 2004; US$ 31.99
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.... more...
- British Computer Society 2008; US$ 43.99
IT is the driving force behind business, but often the technological agenda is set without reference to the commercial goals of the company. Bob Hughes? introduction to delivering success through information technology gives IT and business managers and students the insight needed to make effective use of technology in the pursuit of those goals. more...
- Wiley 2012; US$ 69.95
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political... more...
- IT Governance Publishing 2012; US$ 75.00
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the authors personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the Peoples Republic of China is using a combination of their unique culture, language,... more...
- Packt Publishing 2013; US$ 22.99
This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization.... more...
- Summersdale Publishers Ltd. 2007; US$ 10.99
Includes information needed to get the most out of broadband. This book guides you through the decisions you make, from choosing the right anti-virus software to setting up a wireless network in your home. It contains chapters on instant messaging, downloading music, making phone calls from your computer and finding the best broadband websites. more...
- Elsevier Science 2000; US$ 41.95
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming... more...