The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • SpamAssassinby Alan Schwartz

    O'Reilly Media 2004; US$ 23.99

    The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation,... more...

  • CEH Certified Ethical Hacker All-in-One Exam Guideby Matt Walker; Angela Walker

    McGraw-Hill Education 2011; US$ 50.00

    Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions,... more...

  • The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Editionby Guy Hart-Davis

    McGraw-Hill Education 2011; US$ 25.00

    Get your PC running at full speed again--and remove malevolent software Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing , Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for... more...

  • Database Nationby Simson Garfinkel

    O'Reilly Media 2000; US$ 13.99

    Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these... more...

  • Computer Security Basicsby Rick Lehtinen; Sr. G. T. Gangemi

    O'Reilly Media 2006; US$ 35.99

    This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge.... more...

  • Intrusion Prevention and Active Responseby Michael Rash; Angela Orebaugh; Graham Clark

    Elsevier Science 2005; US$ 51.95

    This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application... more...

  • Defense and Detection Strategies against Internet Wormsby Jose Nazario

    Artech House 2003; US$ 89.00

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... more...

  • PC Magazine Fighting Spyware, Viruses, and Malwareby Ed Tittel

    John Wiley & Sons, Inc. 2004; US$ 29.99

    Think there's no malicious software on your computer? PC Magazine thinks you should think again. Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer--like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's... more...

  • Conquest in Cyberspaceby Martin C. Libicki

    Cambridge University Press 2007; US$ 28.00

    This book shows the risks and protections cyberspace offers for national security and information warfare. more...

  • Integrating ISA Server 2006 with Microsoft Exchange 2007by Fergus Strachan

    Elsevier Science 2011; US$ 51.95

    This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy... more...