The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • The Best Damn Windows Server 2008 Book Periodby Anthony Piltzecker

    Elsevier Science 2011; US$ 59.95

    The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7,... more...

  • Malware Forensicsby Cameron H. Malin; Eoghan Casey; James M. Aquilina

    Elsevier Science 2008; US$ 69.95

    Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system,... more...

  • Mobile Malware Attacks and Defenseby Ken Dunham

    Elsevier Science 2008; US$ 59.95

    Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking,... more...

  • Identifying Malicious Code Through Reverse Engineeringby Abhishek Singh

    Springer 2009; US$ 169.00

    Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies. more...

  • SpamAssassinby Alan Schwartz

    O'Reilly Media 2004; US$ 23.99

    The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation,... more...

  • Surviving Cyberwarby Richard Stiennon

    Government Institutes 2010; US$ 38.99

    This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines... more...

  • Malware Analyst's Cookbook and DVDby Michael Ligh; Steven Adair; Blake Hartstein; Matthew Richard

    Wiley 2010; US$ 59.99

    A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written... more...

  • Computer Security Basicsby Rick Lehtinen; Sr. G. T. Gangemi

    O'Reilly Media 2006; US$ 35.99

    This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge.... more...

  • The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Editionby Guy Hart-Davis

    McGraw-Hill Education 2011; US$ 25.00

    Get your PC running at full speed again--and remove malevolent software Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing , Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for... more...

  • CEH Certified Ethical Hacker All-in-One Exam Guideby Matt Walker; Angela Walker

    McGraw-Hill Education 2011; US$ 50.00

    Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions,... more...