The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • CEH Certified Ethical Hacker Practice Exams, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 30.00

    Don't Let the Real Test Be Your First Test! Fully updated for the CEH v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

  • Dissecting the Hackby Jayson E Street; Kent Nabors; Brian Baskin; Marcus J. Carey

    Elsevier Science 2010; US$ 29.95

    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled ?The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, ?Security Threats... more...

  • Computer Viruses For Dummiesby Peter H. Gregory

    Wiley 2011; US$ 11.99

    Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer... more...

  • Managing Security with Snort & IDS Toolsby Kerry J. Cox; Christopher Gerg

    O'Reilly Media 2004; US$ 31.99

    Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing... more...

  • The Death of the Internetby Markus Jakobsson

    Wiley 2012; US$ 72.95

    Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political... more...

  • 21st Century Chinese Cyberwarfareby Bill Hagestad

    IT Governance Ltd 2012; US$ 90.00

    This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People?s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. The threat of Chinese Cyberwarfare can no longer be ignored. It is a clear and... more...

  • Cuckoo Malware Analysisby Digit Oktavianto

    Packt Publishing 2013; US$ 22.99

    This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization.... more...

  • Implementing AppFogby Matthew Nohr; Isaac Rabinovitch

    Packt Publishing 2013; US$ 17.99

    This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform.Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the... more...

  • Testing and Securing Android Studio Applicationsby Belén Cruz Zapata; Antonio Hernández Niñirola

    Packt Publishing 2014; US$ 20.99

    If you are a developer with some Android knowledge, but you do not know how to test your applications using Android Studio, this book will guide you. It is recommended that you are familiar with Android Studio IDE. more...

  • Spam Kingsby Brian S McWilliams

    O'Reilly Media 2014; US$ 21.99

    "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings , an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposé explores the shadowy world of the people responsible for today?s junk-email epidemic.... more...