The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Social Media Securityby Michael Cross

    Elsevier Science 2013; US$ 49.95

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...

  • The Wireshark Field Guideby Robert Shimonski

    Elsevier Science 2013; US$ 34.95

    The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and... more...

  • Cyber Hackingby Scientific American Editors

    Scientific American 2013; US$ 3.99

    Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door to security threats undreamed of in previous generations. In this eBook, we... more...

  • Intelligent Systems for Security Informaticsby Christopher C Yang; Wenji Mao; Xiaolong Zheng; Hui Wang

    Elsevier Science 2013; US$ 125.00

    The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and... more...

  • Take Control of Your Passwordsby Joe Kissell

    TidBITS 2014; US$ 10.00

    Overcome password frustration with Joe Kissell's expert advice! Updated January 24, 2014 Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic. Read the book to understand the problems... more...

  • Glass Housesby Joel Brenner

    Penguin Group US 2013; US$ 9.99

    A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at... more...

  • Information Security The Complete Reference, Second Editionby Mark Rhodes-Ousley

    McGraw-Hill Education 2013; US$ 70.00

    Develop and implement an effective end-to-end security program Today?s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference ) is the only comprehensive... more...

  • Active Directory Cookbookby Brian Svidergol; Robbie Allen

    O'Reilly Media 2013; US$ 50.99

    Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft?s network directory service. This fourth edition includes... more...

  • Web Services Securityby Mark O'Neill

    McGraw-Hill Education 2003; US$ 55.00

    Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...

  • Network and System Securityby John R. Vacca

    Elsevier Science 2013; US$ 59.95

    Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise. Coverage... more...