The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • Identifying Malicious Code Through Reverse Engineeringby Abhishek Singh

    Springer 2009; US$ 169.00

    Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies. more...

  • Computer Security Basicsby Rick Lehtinen; Sr. G. T. Gangemi

    O'Reilly Media 2006; US$ 35.99

    This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge.... more...

  • The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Editionby Guy Hart-Davis

    McGraw-Hill Education 2011; US$ 25.00

    Get your PC running at full speed again--and remove malevolent software Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing , Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for... more...

  • Wormby Mark Bowden

    Atlantic Books Ltd 2012; US$ 8.74

    Worm is the gripping story of the 'Conficker' virus- which, since its introduction in November 2008, has infected millions of computers around the world - and the cyber security elites who have joined forces in a high-tech game of cops and robbers to find its creators and defeat them. This dramatic cybercrime story travels from the Ukraine... more...

  • Least Privilege Security for Windows 7, Vista and XPby Russell Smith

    Packt Publishing 2010; US$ 35.99

    Secure Microsoft Windows desktops with least privilege security for regulatory compliance and business agility with this book and eBook more...

  • Practical Malware Analysisby Michael Sikorski; Andrew Honig

    No Starch Press 2012; US$ 47.95

    There are more than 100 malicious computer attacks every second, resulting in tens of billions of dollars in economic damages each year. Among security professionals, the skills required to quickly analyze and assess these attacks are in high demand. Practical Malware Analysis provides a rapid introduction to the tools and methods used to dissect malicious... more...

  • A Cyberworm that Knows No Boundariesby Isaac R. Porche III; Jerry M. Sollinger; Shawn McKay

    RAND Corporation 2011; US$ 9.95

    It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and... more...

  • Android Security Cookbookby Keith Makan; Scott Alexander-Bown

    Packt Publishing 2013; US$ 26.99

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to... more...

  • Markets for Cybercrime Tools and Stolen Databy Lillian Ablon; Martin C. Libicki; Andrea A. Golay

    RAND Corporation 2014; US$ 9.95

    Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize... more...

  • Surviving Cyberwarby Richard Stiennon

    Government Institutes 2010; US$ 38.99

    This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines... more...