The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • ?amanie i zabezpieczanie aplikacji w systemie iOSby Jonathan Zdziarski

    Helion 2012; US$ 15.00

    Twoja lektura obowi?zkowa! iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple . Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform?... more...

  • How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spywareby Ken Feinstein

    McGraw-Hill Education 2004; US$ 24.99

    Swat spam, vanquish viruses, knock down pop-ups, and expose spyware with help from this one-of-a-kind resource. Loaded with insightful advice, practical tips, and trial software, this book-and-CD defense will help you rid your computer of the perils and nuisances of Web surfing once and for all. Author and tech expert Ken Feinstein gives easy-to-understand... more...

  • Reverse Deception: Organized Cyber Threat Counter-Exploitationby Sean Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones

    McGraw-Hill Education 2012; US$ 42.00

    In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide.... more...

  • Crafting the InfoSec Playbookby Jeff Bollinger; Brandon Enright; Matthew Valites

    O'Reilly Media 2015; US$ 42.99

    Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...

  • Malware, Rootkits & Botnets A Beginner's Guideby Christopher Elisan

    McGraw-Hill Education 2012; US$ 42.00

    Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After... more...

  • Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Editionby Daniel Regalado; Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness; Branko Spasojevic; Ryan Linn; Stephen Sims

    McGraw-Hill Education 2015; US$ 60.00

    Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy?s current weapons, skills, and tactics... more...

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; US$ 28.00 US$ 19.50

    The never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invented and employ the wars of the present and future?the cyber wars where every country can be a major power player and every hacker a mass destroyer, as reported by a Pulitzer Prize?winning security and defense journalist. In June 1983,... more...

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; Not Available

    The never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invented and employ the wars of the present and future?the cyber wars where every country can be a major power player and every hacker a mass destroyer, as reported by a Pulitzer Prize?winning security and defense journalist. In June 1983,... more...

  • The Art of Computer Virus Research and Defenseby Peter Szor

    Pearson Education 2005; US$ 43.99

    Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...

  • Dissecting the Hackby Jayson E Street; Kent Nabors; Brian Baskin; Marcus J. Carey

    Elsevier Science 2010; US$ 29.95

    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled ?The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, ?Security Threats... more...