The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • Anti-Hacker Tool Kit, Fourth Editionby Mike Shema

    McGraw-Hill Education 2014; US$ 50.00

    Mike Shema is Director of Engineering for Qualys, a leading computer and network security services firm. Regarded as one of the top Web application security experts in the world today, Shema focuses on assessment and mitigation strategies for all aspects of Web application security. Previously, he was NT OBJECTives, Inc.'s Chief Security Office... more...

  • Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Editionby Mark Collier; David Endler

    McGraw-Hill Education 2013; US$ 50.00

    Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company?s UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. David Endler ... more...

  • CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guideby Charles L. Brooks

    McGraw-Hill Education 2014; US$ 50.00

    Charles L. Brooks , MsCIS, CHFI, CEH, CISSP, CompTIA CTT+, owner and principal consultant at Security Technical Education, teaches at Brandeis University in the Rabb School/GPS MSIS program and facilitates online courses at Boston University. He has many years of experience in the IT security industry. more...

  • Cuckoo Malware Analysisby Digit Oktavianto

    Packt Publishing 2013; US$ 22.99

    This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization.... more...

  • Implementing AppFogby Matthew Nohr; Isaac Rabinovitch

    Packt Publishing 2013; US$ 17.99

    This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform.Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the... more...

  • Testing and Securing Android Studio Applicationsby Belén Cruz Zapata; Antonio Hernández Niñirola

    Packt Publishing 2014; US$ 20.99

    If you are a developer with some Android knowledge, but you do not know how to test your applications using Android Studio, this book will guide you. It is recommended that you are familiar with Android Studio IDE. more...

  • Spam Kingsby Brian S McWilliams

    O'Reilly Media 2014; US$ 21.99

    "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings , an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposé explores the shadowy world of the people responsible for today?s junk-email epidemic.... more...

  • Exploiting IT for Business Benefitby Bob Hughes

    British Computer Society 2008; US$ 47.99

    IT is the driving force behind business, yet often the technological agenda is set with little regard for the overriding commercial goals of the organisation. Bob Hughes provides both business and IT practitioners with the necessary insight to harness technology effectively and efficiently, helping you deliver competitive success at every level. ... more...

  • The Beginner's Guide to Broadband and Wireless Internetby Peter Burns

    Summersdale Publishers Ltd. 2007; US$ 10.99

    Includes information needed to get the most out of broadband. This book guides you through the decisions you make, from choosing the right anti-virus software to setting up a wireless network in your home. It contains chapters on instant messaging, downloading music, making phone calls from your computer and finding the best broadband websites. more...

  • E-Mail Virus Protection Handbookby Syngress

    Elsevier Science 2000; US$ 41.95

    The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming... more...