The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Networking

  • Group Policyby Jeremy Moskowitz

    Wiley 2015; US$ 59.99

    Get up to speed on the latest Group Policy tools, features, and best practices Group Policy , Fundamentals, Security, and the Managed Desktop, 3rd Edition help s you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10 and Windows Server vNext, bringing you... more...

  • Cyber-Physical Attacksby George Loukas

    Elsevier Science 2015; US$ 49.95

    Cyber-Physical Attacks: A Growing Invisible Threat  presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building?s lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.... more...

  • Securing Systemsby Brook S. E. Schoenfield

    CRC Press 2015; US$ 69.95

    Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect?s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing... more...

  • CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)by Michael Meyers

    McGraw-Hill Education 2015; US$ 60.00

    From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guide?updated to cover the 2015 release of the CompTIA Network+ exam. Get complete coverage of all the CompTIA Network+ exam objectives inside this comprehensive resource. Written by the leading expert on CompTIA certification and... more...

  • Information Technology and Career Educationby Fun Shao; Wise Shu; Tracy Tian

    CRC Press 2015; US$ 159.00

    Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9?10 October 2014). The book is divided into two main topics: information technology and vocational technology. Considerable attention is also paid to... more...

  • Make: Getting Started with the Photonby Simon Monk

    Maker Media, Inc 2015; US$ 9.99

    The Photon is an open source, inexpensive, programmable, WiFi-enabled module for building connected projects and prototypes. Powered by an ARM Cortex-M3 microcontroller and a Broadcom WiFi chip, the Photon is just as happy plugged into a hobbyist's breadboard as it is into a product rolling off of an assembly line. While the Photon--and its accompanying... more...

  • Abstract Domains in Constraint Programmingby Marie Pelleau

    Elsevier Science 2015; US$ 75.00

    Constraint Programming aims at solving hard combinatorial problems, with a computation time increasing in practice exponentially. The methods are today efficient enough to solve large industrial problems, in a generic framework. However, solvers are dedicated to a single variable type: integer or real. Solving mixed problems relies on ad hoc transformations.... more...

  • CompTIA Storage+ Quick Review Guideby Eric Vanderburg

    McGraw-Hill Education 2015; US$ 40.00

    Concise, focused coverage of the CompTIA Storage+ exam Prepare for the CompTIA Storage+ exam with McGraw-Hill Education?a Platinum-Level CompTIA Authorized Partner?and get the competitive edge on exam day! This convenient self-study tool fully covers the vendor-neutral CompTIA Storage+ Powered by SNIA exam. You?ll learn the skills required to configure... more...

  • Crafting the InfoSec Playbookby Jeff Bollinger; Brandon Enright; Matthew Valites

    O'Reilly Media 2015; US$ 42.99

    Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...

  • Getting a Networking Job For Dummiesby Peter H. Gregory; Bill Hughes

    Wiley 2015; US$ 23.99

    Everything you need to start your career in computer networking Looking to land that computer networking position? Look no further! Getting a Networking Job For Dummies offers all the tools and step-by-step guidance you need to stand out from the crowd, get your foot in the door, and secure a job in this fast-growing sector. In no time, you'll... more...