The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Google Hacking for Penetration Testersby Johnny Long

    Elsevier Science 2004; US$ 46.95

    Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don?t realize is that the deceptively simple components that make Google so easy... more...

  • Google Hacking for Penetration Testersby Johnny Long

    Elsevier Science 2011; US$ 49.95

    This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google?s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including:... more...

  • Google Talkingby Joshua Brashars; Johnny Long

    Elsevier Science 2006; US$ 36.95

    Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications... more...

  • No Tech Hackingby Johnny Long; Kevin D. Mitnick

    Elsevier Science 2011; US$ 49.95

    Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that... more...

  • Stealing the Networkby Johnny Long; Timothy Mullen; Ryan Russell

    Elsevier Science 2011; US$ 51.95

    The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress? ground breaking,... more...

  • Stealing the Networkby Johnny Long; Ryan Russell; Timothy Mullen

    Elsevier Science 2009; US$ 59.95

    "Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse... more...

  • InfoSec Career Hackingby Chris Hurley; Johnny Long; Aaron W Bayles; Ed Brindley

    Elsevier Science 2005; US$ 41.95

    ?InfoSec Career Hacking” starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify... more...

  • OS X for Hackers at Heartby Bruce Potter; Chris Hurley; Johnny Long; Tom Owad; Russ Rogers

    Elsevier Science 2005; US$ 51.95

    The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker?s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world?s foremost ?true hackers” unleash the power of OS X for everything form cutting edge research... more...

  • OS X Exploits and Defenseby Paul Baccas; Kevin Finisterre; Larry H.; David Harley; Gary Porteus; Chris Hurley; Johnny Long

    Elsevier Science 2011; US$ 62.95

    Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh... more...

  • Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigatorsby Johnny Long; Jack Wiles; Russ Rogers; Phil Drake; Ron J. Green; Greg Kipper; Raymond Todd Blackwood; Amber Schroader

    Elsevier Science 2011; US$ 62.95

    ?This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and... more...

  • 1
  • Page