The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • CISSP All-in-One Exam Guide, 6th Editionby Shon Harris

    McGraw-Hill Education 2012; US$ 80.00

    A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by the International... more...

  • Android Security Cookbookby Keith Makan; Scott Alexander-Bown

    Packt Publishing 2013; US$ 26.99

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to... more...

  • Computer Viruses For Dummiesby Peter H. Gregory

    Wiley 2011; US$ 14.99

    Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer... more...

  • Configuring SonicWALL Firewallsby Dan Bendell

    Elsevier Science 2006; US$ 51.95

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...

  • Combating Spyware in the Enterpriseby Paul Piccard

    Elsevier Science 2006; US$ 51.95

    Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section... more...

  • Managing Security with Snort & IDS Toolsby Kerry J. Cox; Christopher Gerg

    O'Reilly Media 2004; US$ 31.99

    Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.... more...

  • Exploiting IT for Business Benefitby Bob Hughes

    British Computer Society 2008; US$ 48.99

    IT is the driving force behind business, but often the technological agenda is set without reference to the commercial goals of the company. Bob Hughes? introduction to delivering success through information technology gives IT and business managers and students the insight needed to make effective use of technology in the pursuit of those goals. more...

  • The Death of the Internetby Markus Jakobsson

    Wiley 2012; US$ 72.95

    Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political... more...

  • 21st Century Chinese Cyberwarfareby William T. Hagestad

    IT Governance Publishing 2012; US$ 75.00

    21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the author’s personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the People’s Republic of China is using a combination of their unique culture, language,... more...

  • Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Editionby Mark Collier; David Endler

    McGraw-Hill Education 2013; US$ 50.00

    The latest techniques for averting UC disaster ?This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.? ?Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast ?The original edition, Hacking... more...