The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

  • 10 Don'ts on Your Digital Devicesby Eric Rzeszut; Daniel Bachrach

    Apress 2014; US$ 20.99

    In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and... more...

  • 125 sposobów na bezpiecze?stwo sieci. Wydanie IIby Andrew Lockhart

    Helion 2007; US$ 15.00

    Praktyczny przewodnik po technikach zabezpieczania sieci komputerowych Jak sprawnie zabezpieczy? system? Jak zapewni? sobie prywatno?? w internecie? Jak skutecznie walczy? z sieciowymi w?amywaczami? W naszych domach montujemy solidne zamki i drzwi, chronimy samochody wymy?lnymi alarmami, w firmach zak?adamy systemy monitoringu,... more...

  • 21st Century Chinese Cyberwarfareby Bill Hagestad

    IT Governance Ltd 2012; US$ 150.00

    This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People?s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and... more...

  • 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Themby Michael Howard; David LeBlanc; John Viega

    McGraw-Hill Education 2009; US$ 52.00

    "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years... more...

  • 5 Gearsby Jeremie Kubicek; Steve Cockram

    Wiley 2015; US$ 25.00

    Be present, connect more effectively, all while being as productive as possible 5 Gears: How to Be Present and Productive When There's Never Enough Time teaches you to shift into the right gear at the right time so that you can grow in your relational intelligence and increase your influence. This revolutionary text introduces you to the five... more...

  • The 7 Qualities of Highly Secure Softwareby Mano Paul

    CRC Press 2012; US$ 54.95

    The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies?ranging from Aesop?s fables, athletics, architecture, biology, nursery rhymes, and video games?to illustrate the qualities that are essential for the development of highly secure... more...

  • 802.11 Wireless Networksby Alan Holt; Chi-Yu Huang

    Springer London 2010; US$ 179.00

    This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions.  The text is supported by examples and detailed instructions. more...

  • 802.1X Port-Based Authenticationby Edwin Lyle Brown

    CRC Press 2006; US$ 94.95

    Port-based authentication is a ?network access control? concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today.... more...

  • @Warby Shane Harris

    Houghton Mifflin Harcourt 2014; US$ 15.95

    Cloak-and-dagger, high tech, and big business converge in this revelatory, page-turning account of a new kind of conflict, less visible but more invasive than any war America has fought before.   more...

  • A+, Network+, Security+ Exams in a Nutshellby Pawan K. Bhardwaj

    O'Reilly Media 2007; US$ 43.99

    If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of specialization.... more...