The Leading eBooks Store Online
3,788,875 members ⚫ 1,234,658 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Simon & Schuster 2016; US$ 28.00 US$ 20.50
?A consistently eye-opening history...not just a page-turner but consistently surprising.? ? The New York Times ?A book that grips, informs, and alarms, finely researched and lucidly related.? ?John le Carré As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming... more...
- Packt Publishing 2015; US$ 39.99
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite... more...
- Packt Publishing 2016; US$ 39.99
Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book: A straightforward guide to address the roadblocks face when doing mobile forensics; Simplify mobile forensics using the right mix of methods, techniques, and tools; Get valuable advice to put you in the mindset of a forensic professional, regardless... more...
- Elsevier Science 2010; US$ 29.95
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition , deals with hackers and hacking. The book is divided into two parts. The first part, entitled ?The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, ?Security... more...
- McGraw-Hill Education 2012; US$ 50.00
The latest tactics for thwarting digital attacks ?Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker?s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for... more...
- Helion 2012; US$ 10.00
Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniaj?ce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany... more...
- McGraw-Hill Education 2014; US$ 70.00
Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two eBooks, electronic content, and a bonus quick review guide. CEH Certified Ethical Hacker All-in-One Exam Guide , Second Edition Complete coverage of all CEH exam objectives Ideal as both a study tool and an on-the-job resource Electronic content... more...
- O'Reilly Media 2015; US$ 25.99
- O'Reilly Media 2015; US$ 42.99
If you?re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You?ll learn how to conduct scientific experiments on everyday tools and procedures, whether you?re evaluating... more...
- Packt Publishing 2016; US$ 39.99
Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book: Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic; Connect the dots by understanding web proxies, firewalls, and routers to close in on your... more...