The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cloud Security and Privacyby Tim Mather; Subra Kumaraswamy; Shahed Latif

    O'Reilly Media 2009; US$ 27.99

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...

  • Drugs on the Dark Netby James Martin

    Palgrave Macmillan 2014; US$ 45.00

    This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptomarkets can be found thriving on the dark net. Martin explores how these websites defy powerful law enforcement agencies and represent the new digital front in the 'war on drugs'. more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • Internet Security You Can Affordby Christopher Dawson

    Cengage Learning PTR 2014; US$ 39.99

    Discover one of the most efficient, effective, and inexpensive ways to stop Internet threats and protect your organization or home from malware and objectionable content with Internet Security You Can Afford: The Untangle® Internet Gateway. This book by educator and well-known ZDnet technology expert Chris Dawson demonstrates how you can establish... more...

  • PCI Complianceby Branden R. Williams; Anton Chuvakin

    Elsevier Science 2014; US$ 69.95

    Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official... more...

  • CompTIA Security+ SY0-401 In Depthby Mark Ciampa

    Cengage Learning PTR 2014; US$ 50.00

    Comptia Security+ Sy0-401 in Depth Will Prepare You to Pass Comptia’S New Security+ Certification Exam and Earn This Important Credential in the Field of Computer Security. This Book Offers In-Depth Coverage of All Relevant Topics, from Handling Malware to Advanced Cryptography, Wireless and Mobile Security, and Much More. Using the Proven in... more...

  • Learning Ansibleby Madhurranjan Mohaan; Ramesh Raithatha

    Packt Publishing 2014; US$ 26.99

    If you want to learn how to use Ansible to automate an infrastructure, either from scratch or to augment your current tooling with Ansible, then this is the book for you. It has plenty of practical examples to help you get to grips with Ansible. more...

  • Optimizing IEEE 802.11i Resource and Security Essentialsby I.S. Amiri; Parisa Naraei; Iman Saberi

    Elsevier Science 2014; US$ 69.95

    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE... more...

  • How to Define and Build an Effective Cyber Threat Intelligence Capabilityby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from... more...

  • How to Defeat Advanced Malwareby Max Dalziel

    Elsevier Science 2014; US$ 39.95

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise... more...