The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Information Technology

  • Risk Managementby Carl L. EVP PMI-RMP PMP Pritchard

    Taylor and Francis 2014; US$ 59.95

    This new edition of Risk Management: Concepts and Guidance supplies a look at risk in light of current information, yet remains grounded in the history of risk practice. Taking a holistic approach, it examines risk as a blend of environmental, programmatic, and situational concerns. Supplying comprehensive coverage of risk management tools, practices,... more...

  • High Availability IT Servicesby Terry Critchley

    Taylor and Francis 2014; US$ 79.95

    This book starts with the basic premise that a service is comprised of the 3Ps?products, processes, and people. Moreover, these entities and their sub-entities interlink to support the services that end users require to run and support a business. This widens the scope of any availability design far beyond hardware and software. It also increases... more...

  • Guide to Cloud Computing for Business and Technology Managersby Vivek Kale

    Taylor and Francis 2014; US$ 89.95

    Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises. It provides a clear understanding of what cloud computing really means, what it can do, and when it is practical... more...

  • Advanced Persistent Threat Hackingby Tyler Wrightson

    McGraw-Hill Education 2014; US$ 50.00

    Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy... more...

  • Building an Intelligence-Led Security Programby Allan Liska

    Elsevier Science 2014; US$ 69.95

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices... more...

  • CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)by Wm. Arthur Conklin; Greg White; Dwayne Williams; Chuck Cothren; Roger Davis

    McGraw-Hill Education 2014; US$ 60.00

    Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter,... more...

  • How to Define and Build an Effective Cyber Threat Intelligence Capabilityby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from... more...

  • How to Defeat Advanced Malwareby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise... more...

  • Introduction to US Cybersecurity Careersby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into... more...

  • Principles of Wireless Sensor Networksby Mohammad Obaidat; Sudip Misra

    Cambridge University Press 2014; US$ 79.00

    A concise and clear guide to the concepts and applications of wireless sensor networks, ideal for students, practitioners and researchers. more...