The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Gray Hat Hacking, Second Editionby Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness

    McGraw-Hill Education 2008; US$ 49.99

    Uncover, plug, and ethically disclose security flaws Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line... more...

  • Windows Lockdown!by Andy Edward Walker

    Pearson Education 2008; US$ 19.99

     Today, if you own a Windows computer you need to understand the risks and the potential damage security threats pose. The mere act of turning on an Internet-connected computer can put you, your family, and even your personal finances at risk! This book defines all the threats an average household might face and provides strategies to turn novice... more...

  • Malware Detectionby Mihai Christodorescu; Somesh Jha; Douglas Maughan

    Springer 2007; US$ 289.00

    Shared resources, such as the internet, have created a highly interconnected cyber-infrastructure. Many malicious attacks on critical infrastructures are achieved by malicious code or malware, such as viruses and worms. This book captures the research in the area of malicious code detection, prevention and mitigation. more...

  • Chained Exploitsby Andrew Whitaker; Keatron Evans; Jack Voth

    Pearson Education 2009; US$ 43.99

    The complete guide to today?s hard-to-defend chained attacks: performing them and preventing them   Nowadays, it?s rare for malicious hackers to rely on just one exploit or tool; instead, they use ?chained? exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to... more...

  • ISO27001 in a Windows ® Environmentby Brian Honan

    IT Governance Ltd 2010; US$ 66.00

    Gives a detailed breakdown of the controls needed for ISO27001, and discusses the Microsoft products that can be used to implement them. more...

  • The Tao of Network Security Monitoringby Richard Bejtlich

    Pearson Education 2004; US$ 59.99

    "The book you are about to read will arm you with the knowledge you need to defend your network from attackers?both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP... more...

  • Hacking Exposed Web Applications, Third Editionby Joel Scambray; Vincent Liu; Caleb Sima

    McGraw-Hill Education 2010; US$ 53.00

    Chapter 1 Hacking Web Apps 101 Chapter 2 Profiling Chapter 3 Hacking Web Platforms Chapter 4 Attacking Web Authentication Chapter 5 Attacking Web Authorization Chapter 6 Input Injection Attacks Chapter 7 Attacking XML Web Services Chapter 8 Attacking Web Application Management Chapter 9 Hacking Web Clients Chapter 10 The Enterprise Web Application... more...

  • Proceedings of the International Conference on IT Convergence and Security 2011by Kuinam J. Kim; Seong Jin Ahn

    Springer 2011; US$ 159.00

    As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information... more...

  • Unauthorised Accessby Wil Allsopp

    Wiley 2010; US$ 45.00

    The first guide to planning and performing a physicalpenetration test on your computer's security Most IT security teams concentrate on keeping networks andsystems safe from attacks from the outside-but what if yourattacker was on the inside? While nearly all IT teams perform avariety of network and application penetration testing procedures,an... more...

  • Hacker's Challengeby Mike Schiffman

    McGraw-Hill Education 2002; US$ 32.95

    Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants. more...