The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Ethical Hacking and Penetration Testing Guideby Rafay Baloch

    Taylor and Francis 2014; US$ 59.95

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...

  • The Official CHFI Study Guide (Exam 312-49)by Dave Kleiman

    Elsevier Science 2011; US$ 62.95

    This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their... more...

  • Datenbanken - Konzepte und Sprachenby Gunter Saake; Kai-Uwe Sattler; Andreas Heuer

    Verlagsgruppe Hüthig Jehle Rehm 2013; US$ 37.99

    Aus dem Inhalt: Kernkonzepte relationaler Datenbanken Architekturen Datenbankentwurfsprozess Entity-Relationship-Modellierung Relationenmodell Erweiterte Konzepte Erweiterte Entwurfsmodelle SQL und weitere Anfragesprachen Sichten, Transaktionen, Integrität und Trigger Datenbankanwendungsentwicklung Zugriffskontrolle & Privacy Weitere... more...

  • Coding for Penetration Testersby Jason Andress; Ryan Linn

    Elsevier Science 2011; US$ 39.95

    Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of... more...

  • Privacy and Big Databy Terence Craig; Mary E. Ludloff

    O'Reilly Media 2011; US$ 16.99

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected,... more...

  • Counter Hack Reloadedby Edward Skoudis; Tom Liston

    Pearson Education 2005; US$ 63.99

    For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today?s newest,... more...

  • The Chief Information Security Officerby Barry Kouns; Jake Kouns

    IT Governance Ltd 2011; US$ 18.50

    Explains the hard and soft skills that a good CISO needs to thrive. more...

  • The Art of Computer Virus Research and Defenseby Peter Szor

    Pearson Education 2005; US$ 43.99

    Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...

  • Executive Guide to Information Securityby Mark Egan; Tim Mather

    Pearson Education 2004; US$ 34.99

    A Business-Focused Information Security Action Plan for Every Executive Today, every executive must understand information security from a business perspective. Now, this concise book tells business leaders exactly what they need to know to make intelligent decisions about security?without ever getting lost in the technical complexities. more...

  • Information Security Risk Analysisby Thomas R. Peltier

    CRC Press 2005; US$ 87.95

    A veteran of computer technology and especially computer security, Peltier presents a variety of concepts and ideas about risk analysis, and demonstrates how they can be used. He covers risk management, the risk assessment process, quantitative versus qualitative approaches, other forms of qualitative risk assessment, the facilitated risk analysis more...