The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2012; US$ 80.00
Chapter 1: Becoming a CISSP Chapter 2: Information Security Governance and Risk Management Chapter 3: Access Control Chapter 4: Security Architecture and Design Chapter 5: Physical and Environmental Security Chapter 6: Telecommunications and Network Security Chapter 7: Cryptography Chapter 8: Business Continuity and Disaster Recovery Planning... more...
- McGraw-Hill Education 2012; US$ 42.00
Ch 1. Introduction Ch 2. Deception Throughout History to Today Ch 3. The Applications & Goals of Cyber Counterintelligence Ch 4. The Missions and Outcomes of Criminal Profiling Ch 5. Legal & Ethical Aspects of Deception Ch 6. Attack Tradecraft Ch 7. Operational Deception Ch 8. Tools, Tactics & Procedures Ch 9. Attack Attribution Ch 10. Black... more...
- O'Reilly Media 2015; US$ 42.99
Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...
- Helion 2012; US$ 15.00
Twoja lektura obowi?zkowa! iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple . Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform?... more...
- McGraw-Hill Education 2004; US$ 24.99
Swat spam, vanquish viruses, knock down pop-ups, and expose spyware with help from this one-of-a-kind resource. Loaded with insightful advice, practical tips, and trial software, this book-and-CD defense will help you rid your computer of the perils and nuisances of Web surfing once and for all. Author and tech expert Ken Feinstein gives easy-to-understand... more...
- McGraw-Hill Education 2012; US$ 42.00
Chapter 1. Getting in Gear Chapter 2. A Brief History of Malware Chapter 3. Cloak of the Rootkit Chapter 4. Rise of the Botnets Chapter 5. The Threat Ecosystem Chapter 6. The Malware Factory Chapter 7. Infection Vectors Chapter 8. The Compromised System Chapter 9. Understanding Your System Chapter 10. Identifying a Possible Threat Chapter... more...
- McGraw-Hill Education 2015; US$ 60.00
Part I: Law & Ethics 1: Ethical Hacking and the Legal System Part II: Crash Course: Preparing for the War 2 Programming Survival Skill3 Passive Analysis4 Advanced Reverse Engineering with IDA Pro 5 Intelligent Fuzzing 6 Shellcode Strategies7 Writing Linux Shellcode Part III: From Vulnerability to Exploit 8: Spoofing Based Attacks 9: Exploiting Cisco... more...
- Pearson Education 2005; US$ 43.99
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...
- Elsevier Science 2010; US$ 29.95
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled ?The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, ?Security Threats... more...
- McGraw-Hill Education 2012; US$ 50.00
1: Footprinting 2: Scanning 3: Enumeration 4. Hacking Windows 5. Hacking UNIX 6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded) 8: Wireless Devices (Expanded) 9: Embedded Systems (NEW) 10: Web Hacking 11. Countermeasures Map (NEW) Appendix A: Ports Appendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service... more...