The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Computer Security and Cryptographyby Alan G. Konheim

    Wiley 2007; US$ 150.00

    ALAN G. KONHEIM , PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models. more...

  • Hacking Exposedby Joel Scambray; Stuart McClure; George Kurtz

    McGraw-Hill Education 2000; US$ 39.99

    This one-of-a-kind book provides in-depth expert insight into how hackers infiltrate e-business, and how they can be stopped. more...

  • WarDrivingby Chris Hurley

    Elsevier Science 2004; US$ 51.95

    The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry.... more...

  • Wi-Fi Securityby Stewart Miller

    McGraw-Hill Education 2003; US$ 54.95

    By following this resource, corporations can go wireless and still protect mission-critical data. Top corporate security consultant Stewart Miller covers security for Windows, Linux, Macs, Palms, and other PDAs and shows how to prevent breaches caused by weak encryption protocols. * Review security approaches for the different standards currently... more...

  • Hacker's Challengeby Mike Schiffman

    McGraw-Hill Education 2002; US$ 32.95

    Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants. more...

  • Ajax Securityby Billy Hoffman; Bryan Sullivan

    Pearson Education 2007; US$ 43.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities   More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly... more...

  • PCI Complianceby Branden R. Williams; Anton Chuvakin; Tony Bradley

    Elsevier Science 2011; US$ 64.95

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry... more...

  • Gray Hat Hacking, Second Editionby Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness

    McGraw-Hill Education 2008; US$ 49.99

    "A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker more...

  • Windows Lockdown!by Andy Edward Walker

    Pearson Education 2008; US$ 19.99

     Today, if you own a Windows computer you need to understand the risks and the potential damage security threats pose. The mere act of turning on an Internet-connected computer can put you, your family, and even your personal finances at risk! This book defines all the threats an average household might face and provides strategies to turn novice... more...

  • Chained Exploitsby Andrew Whitaker; Keatron Evans; Jack Voth

    Pearson Education 2009; US$ 43.99

    The complete guide to today?s hard-to-defend chained attacks: performing them and preventing them   Nowadays, it?s rare for malicious hackers to rely on just one exploit or tool; instead, they use ?chained? exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to... more...