The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Packt Publishing 2013; US$ 17.99
This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform.Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the... more...
- IT Governance Publishing 2012; US$ 75.00
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the authors personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the Peoples Republic of China is using a combination of their unique culture, language,... more...
- Wiley 2012; US$ 72.95
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political... more...
- O'Reilly Media 2004; US$ 31.99
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing... more...
- Summersdale Publishers Ltd. 2007; US$ 10.99
Includes information needed to get the most out of broadband. This book guides you through the decisions you make, from choosing the right anti-virus software to setting up a wireless network in your home. It contains chapters on instant messaging, downloading music, making phone calls from your computer and finding the best broadband websites. more...
- Elsevier Science 2000; US$ 41.95
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming... more...
- Springer 2006; US$ 169.00
Provides a view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. more...
- Elsevier Science 2011; US$ 59.95
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7,... more...
- Elsevier Science 2008; US$ 69.95
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system,... more...