The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

Most popular at the top

  • Cybersecurity and Cyberwarby Peter W. Singer; Allan Friedman

    Oxford University Press, USA 2013; US$ 12.99

    A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone:... more...

  • Computer Security and Cryptographyby Alan G. Konheim

    Wiley 2007; US$ 150.00

    Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and... more...

  • Information Securityby Mark Stamp

    Wiley 2005; US$ 104.95

    Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping... more...

  • The Art of Deceptionby Kevin D. Mitnick; William L. Simon; Steve Wozniak

    Wiley 2011; US$ 16.95

    Kevin Mitnick is the founder of Defensive Thinking, an information security firm, and speaks widely on security issues. He has appeared on 60 Minutes and elsewhere in the media, and his exploits have spawned several bestselling books, including The Fugitive Game. William Simon is the bestselling author of more than twenty books. more...

  • Gray Hat Hacking, Second Editionby Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness

    McGraw-Hill Education 2008; US$ 49.99

    Uncover, plug, and ethically disclose security flaws Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line... more...

  • Hacking Exposed Web Applications, Third Editionby Joel Scambray; Vincent Liu; Caleb Sima

    McGraw-Hill Education 2010; US$ 50.00

    Chapter 1 Hacking Web Apps 101 Chapter 2 Profiling Chapter 3 Hacking Web Platforms Chapter 4 Attacking Web Authentication Chapter 5 Attacking Web Authorization Chapter 6 Input Injection Attacks Chapter 7 Attacking XML Web Services Chapter 8 Attacking Web Application Management Chapter 9 Hacking Web Clients Chapter 10 The Enterprise Web Application... more...

  • Hacker's Challengeby Mike Schiffman

    McGraw-Hill Education 2002; US$ 32.95

    Mike Schiffman is the director of research and development at Guardent, the leading provider of professional security services. He has written for numerous technical journals, has written white papers, and has contributed to Hacking Exposed. more...

  • Wi-Fi Securityby Stewart Miller

    McGraw-Hill Education 2003; US$ 54.95

    Chapter 1: Introduction to the Wireless LAN Industry Security Standards Chapter 2: Technology Chapter 3: Wireless LAN Security Factors Chapter 4: Issues in Wireless Security Chapter 5: The 802.11 Standard Defined Chapter 6: Wi-Fi Security Infrastructure Chapter 7: 802.11 Encryption: Wired Equivalent Chapter 8: Unauthorized Access & Privacy Chapter... more...

  • Hacking Exposedby Joel Scambray; Stuart McClure; George Kurtz

    McGraw-Hill Education 2000; US$ 39.99

    Casing the Establishment. Footprinting. Scanning. Enumeration. System Hacking. Hacking the Consumer: Win9x, Web Browsers, E-mail Clients, & Broadband Internet Access. Hacking Windows NT. Hacking Windows 2000. Novell Netware Hacking. UNIX. Network Hacking. Dial-Up & VPN Hacking. Network Devices. Firewalls. Denial of Service (DoS) Attacks.... more...

  • Soft Errorsby Jean-Luc Autran; Daniela Munteanu

    CRC Press 2015; US$ 159.95

    Soft errors are a multifaceted issue at the crossroads of applied physics and engineering sciences. Soft errors are by nature multiscale and multiphysics problems that combine not only nuclear and semiconductor physics, material sciences, circuit design, and chip architecture and operation, but also cosmic-ray physics, natural radioactivity issues,... more...