The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer security

  • Security without Obscurityby J.J. Stapleton

    Taylor and Francis 2014; US$ 79.95

    The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity:... more...

  • Case Studies in Secure Computingby Biju Issac; Nauman Israr

    Taylor and Francis 2014; US$ 119.95

    In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...

  • The News Machineby James Hanning; Glenn Mulcaire

    Gibson Square 2014; US$ 5.82

    There is one mystery figure at the heart of ‘Hackergate? – Glenn Mulcaire, the News of the World?s top private investigator. The former AFC Wimbledon footballer has never spoken publicly or in court about his work investigating and backing up front-page news stories (such as the News of the World?s award-winning David Beckham scoop). Mulcaire?s... more...

  • CEH: Certified Ethical Hacker Version 8 Study Guideby Sean-Philip Oriyano

    Wiley 2014; US$ 49.99

    Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam... more...

  • Ethical Hacking and Penetration Testing Guideby Rafay Baloch

    Taylor and Francis 2014; US$ 59.95

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration... more...

  • Selected papers from Kaspersky Lab's CyberSecurity for the Next Generation Conference 2013by Steven Furnell; Veniamin Ginodman; Natalya Obelets; Ram Herkanaidu

    Emerald Group Publishing Limited 2014; US$ 199.00

    The selected papers presented here were finalists at Kaspersky Academy’s CyberSecurity for the Next Generation Conference Final 2013, which took place at Royal Holloway, University of London, from 25-26 June 2013. The papers address a variety of topical issues, including security vulnerabilities in Near Field Communications, security education... more...

  • Mastering Kali Linux for Advanced Penetration Testingby Robert W. Beggs

    Packt Publishing 2014; US$ 32.99

    This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques. If you are an IT professional... more...

  • vSphere Design Best Practicesby Brian "Bo" Bolander; Christopher Kusek

    Packt Publishing 2014; US$ 16.99

    An easy-to-follow guide full of hands-on examples of real-world design best practices. Each topic is explained and placed in context, and for the more inquisitive, there are more details on the concepts used.If you wish to learn about vSphere best practices and how to apply them when designing virtual, high performance, reliable datacenters that support... more...

  • The Basics of Information Securityby Jason Andress

    Elsevier Science 2014; US$ 34.95

    As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical... more...

  • Targeted Cyber Attacksby Aditya Sood; Richard Enbody

    Elsevier Science 2014; US$ 29.95

    Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering... more...