The Leading eBooks Store Online

3,840,610 members ⚫ 1,266,180 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; US$ 16.99

    ?An important, disturbing, and gripping history? ( Kirkus Reviews , starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars?where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the... more...

  • Windows Malware Analysis Essentialsby Victor Marak

    Packt Publishing 2015; US$ 39.99

    Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This Book• Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware• Understand how to decipher x86 assembly code from source code inside your favourite... more...

  • Mobile Forensics – Advanced Investigative Strategiesby Oleg Afonin; Vladimir Katalov

    Packt Publishing 2016; US$ 39.99

    Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book: A straightforward guide to address the roadblocks face when doing mobile forensics; Simplify mobile forensics using the right mix of methods, techniques, and tools; Get valuable advice to put you in the mindset of a forensic professional, regardless... more...

  • Dissecting the Hackby Jayson E Street; Kent Nabors; Brian Baskin; Marcus J. Carey

    Elsevier Science 2010; US$ 29.95

    Dissecting the Hack: The F0rb1dd3n Network, Revised Edition , deals with hackers and hacking. The book is divided into two parts. The first part, entitled ?The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, ?Security... more...

  • Hacking Exposed 7by Stuart McClure; Joel Scambray; George Kurtz

    McGraw-Hill Education 2012; US$ 50.00

    The latest tactics for thwarting digital attacks ?Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker?s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for... more...

  • Podstawy ochrony komputerówby Rick Lehtinen; Deborah Russell; Sr. G. T. Gangemi

    Helion 2012; US$ 10.00

    Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniaj?ce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany... more...

  • CEH Certified Ethical Hacker Bundle, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 70.00

    Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two eBooks, electronic content, and a bonus quick review guide. CEH Certified Ethical Hacker All-in-One Exam Guide , Second Edition Complete coverage of all CEH exam objectives Ideal as both a study tool and an on-the-job resource Electronic content... more...

  • The Architecture of Privacyby Courtney Bowman; Ari Gesher; John K Grant; Daniel Slate; Elissa Lerner

    O'Reilly Media 2015; US$ 25.99

    Technology?s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product... more...

  • Learning Network Forensicsby Samir Datt

    Packt Publishing 2016; US$ 39.99

    Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book: Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic; Connect the dots by understanding web proxies, firewalls, and routers to close in on your... more...

  • Cybersecurity Essentialsby Charles J. Brooks; Philip Craig; Donald Short

    Wiley 2017; US$ 40.00 US$ 34.99

    An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices,... more...