The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Cybersecurity and Cyberwarby Peter W. Singer; Allan Friedman

    Oxford University Press, USA 2013; US$ 12.99

    A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone:... more...

  • Ethical Hacking and Penetration Testing Guideby Rafay Baloch

    CRC Press 2014; US$ 59.95

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...

  • Privacy and Big Databy Terence Craig; Mary E. Ludloff

    O'Reilly Media 2011; US$ 16.99

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected,... more...

  • Computer Forensics JumpStartby Micah Solomon; Diane Barrett; Neil Broom

    Wiley 2015; US$ 29.99

    Launch Your Career in Computer Forensics?Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to launch your career in this fast-growing field: Conducting a computer forensics investigation Examining the layout of a network Finding hidden data ... more...

  • Counter Hack Reloadedby Edward Skoudis; Tom Liston

    Pearson Education 2005; US$ 63.99

    For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today?s newest,... more...

  • The Chief Information Security Officerby Barry Kouns; Jake Kouns

    IT Governance Ltd 2011; US$ 18.50

    This guide describes the hard and soft skills that a successful CISO requires. Emphasising the importance of a suitable Information Security Management System (ISMS) and the risk management methodology that should be at its heart, it explains the changing goals of the information security department. more...

  • Executive Guide to Information Securityby Mark Egan; Tim Mather

    Pearson Education 2004; US$ 34.99

    A Business-Focused Information Security Action Plan for Every Executive Today, every executive must understand information security from a business perspective. Now, this concise book tells business leaders exactly what they need to know to make intelligent decisions about security?without ever getting lost in the technical complexities. more...

  • The Art of Intrusionby Kevin D. Mitnick; William L. Simon

    Wiley 2009; US$ 16.95

    Hacker extraordinaire Kevin Mitnick delivers the explosiveencore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented... more...

  • The Art of Computer Virus Research and Defenseby Peter Szor

    Pearson Education 2005; US$ 43.99

    Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...

  • Security Metricsby Andrew Jaquith

    Pearson Education 2007; US$ 47.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing... more...