The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Network Security First-Stepby Thomas M. Thomas; Donald Stoddard

    Pearson Education 2011; US$ 27.99

    Network Security first-step Second Edition   Tom Thomas and Donald Stoddard   Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy   Your first step to network security begins here! Learn how hacker attacks work,... more...

  • Home Network Security Simplifiedby Jim Doherty; Neil Anderson

    Pearson Education 2006; US$ 19.99

    A straightforward, graphic-based reference for securing your home network  Set up a firewall Secure your wireless network Stop adware and spyware Keep your children safe from online threats Prevent a virus outbreak Avoid Internet scams  Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a... more...

  • CompTIA Security+ SY0-301 Authorized Cert Guideby David L. Prowse

    Pearson Education 2011; US$ 47.99

    Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. This is the eBook edition of the CompTIA Security+ SY0-301 Authorized Cert Guide .  This eBook does not include... more...

  • Broadband Quantum Cryptographyby Daniel Rogers

    Morgan & Claypool Publishers 2010; US$ 35.00

    Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for... more...

  • Tragedy in the Gulfby George D. Catalano

    Morgan & Claypool Publishers 2010; US$ 30.00

    The recent tragedy in the Gulf of Mexico and resultant ethical consequences for the engineering profession are introduced and discussed. The need for a new engineering ethic is identified and introduced based upon advancements in science, complex systems and eco-philosophy. Motivations for introducing a new ethic rather than modifying existing ethics... more...

  • Hands-On Ethical Hacking and Network Defenseby Michael T. Simpson

    Course Technology PTR 2012; US$ 39.99

    It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand... more...

  • Monitoring i bezpiecze?stwo sieciby Chris Fry; Martin Nystrom

    Helion 2012; US$ 9.99

    Poznaj najskuteczniejsze metody obrony sieci korporacyjnych Jak stworzy? more...

  • Archiwizacja i odzyskiwanie danychby W. Curtis Preston

    Helion 2012; US$ 23.99

    Optymalizacja procesu archiwizacji dla administratorów i nie tylko Jak archiwizowa? i odtwarza? system oraz dane? Jak wybra? optymaln? metod? archiwizacji? Jak ograniczy? koszty zwi?zane z procesem archiwizacji? Wdro?enie systemu archiwizacji jest podstawow? czynno?ci?, jak? administrator powinien wykona?. Cel tej procedury jest oczywisty,... more...

  • CISSP Practice Questions Exam Cramby Michael Gregg

    Pearson Education 2012; US$ 31.99

    CISSP Practice Questions, Third Edition   CISSP Practice Questions Exam Cram , Third Edition complements any CISSP study plan with 1,001 practice test questions in the book and on the CD?all supported by complete explanations of every answer. This package?s highly realistic questions cover every area of knowledge for the new CISSP exam. ... more...

  • 125 sposobów na bezpiecze?stwo sieci. Wydanie IIby Andrew Lockhart

    Helion 2012; US$ 15.00

    Praktyczny przewodnik po technikach zabezpieczania sieci komputerowych Jak sprawnie zabezpieczy? system? Jak zapewni? sobie prywatno?? w internecie? Jak skutecznie walczy? z sieciowymi w?amywaczami? W naszych domach montujemy solidne zamki i drzwi, chronimy samochody wymy?lnymi alarmami, w firmach zak?adamy systemy monitoringu,... more...