The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • ?amanie i zabezpieczanie aplikacji w systemie iOSby Jonathan Zdziarski

    Helion 2012; US$ 15.00

    Twoja lektura obowi?zkowa! iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple . Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform?... more...

  • How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spywareby Ken Feinstein

    McGraw-Hill Education 2004; US$ 24.99

    Swat spam, vanquish viruses, knock down pop-ups, and expose spyware with help from this one-of-a-kind resource. Loaded with insightful advice, practical tips, and trial software, this book-and-CD defense will help you rid your computer of the perils and nuisances of Web surfing once and for all. Author and tech expert Ken Feinstein gives easy-to-understand... more...

  • Reverse Deception: Organized Cyber Threat Counter-Exploitationby Sean Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones

    McGraw-Hill Education 2012; US$ 42.00

    In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. ... more...

  • Crafting the InfoSec Playbookby Jeff Bollinger; Brandon Enright; Matthew Valites

    O'Reilly Media 2015; US$ 42.99

    Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...

  • E-Mail Hackingby Julie J. C. H. Ryan; Cade Kamachi

    Franzis Verlag 2015; US$ 18.61

    ?Vorsicht bei vermeintlichen E-Mails von der Deutschen Bank: Derzeit wollen Betrüger unter falschem Namen die Bankdaten von Kunden ergattern. Die Anfragen sollte man am besten direkt löschen.? (SPIEGEL ONLINE, 22.06.2015) ?Beim Cyberangriff auf den Deutschen Bundestag sind auch E-Mail-Daten kopiert worden. Das bestätigt ein Parlamentssprecher nun.?... more...

  • Hacking Handbuchby Dr. Patrick Engebretson

    Franzis Verlag 2015; US$ 27.92

    Täglich liest man von neuen Sicherheitslücken und Hackern, die diese Lücken ausnutzen - sobald man selbst betroffen ist, weiß man, wie sich Datenklau und ein nicht funktionierendes IT-System anfühlen. Was kann man dagegen tun? Vorsorgen und Sicherheitslücken schließen. Dafür müssen Sie die Techniken und Werkzeuge der Hacker kennen und am besten selbst... more...

  • Malware, Rootkits & Botnets A Beginner's Guideby Christopher Elisan

    McGraw-Hill Education 2012; US$ 42.00

    Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After... more...

  • Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Editionby Daniel Regalado; Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness; Branko Spasojevic; Ryan Linn; Stephen Sims

    McGraw-Hill Education 2015; US$ 60.00

    Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy?s current weapons, skills, and tactics... more...

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; US$ 28.00 US$ 19.50

    As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War , by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors... more...

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; Not Available

    As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War , by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors... more...