The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • A Cyberworm that Knows No Boundariesby Isaac R. Porche III; Jerry M. Sollinger; Shawn McKay

    RAND Corporation 2011; US$ 9.95

    It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and... more...

  • CEH Certified Ethical Hacker All-in-One Exam Guide, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 50.00

    "All-in-One Is All You Need." Fully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the CEH exam. You'll fnd learning objectives at the... more...

  • PC Magazine Fighting Spyware, Viruses, and Malwareby Ed Tittel

    John Wiley & Sons, Inc. 2004; US$ 29.99

    Think there's no malicious software on your computer? PC Magazine thinks you should think again. Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer--like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by following Ed Tittel's... more...

  • Intrusion Prevention and Active Responseby Michael Rash; Angela Orebaugh; Graham Clark

    Elsevier Science 2005; US$ 51.95

    This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application... more...

  • Defense and Detection Strategies against Internet Wormsby Jose Nazario

    Artech House 2003; US$ 89.00

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... more...

  • Conquest in Cyberspaceby Martin C. Libicki

    Cambridge University Press 2007; US$ 28.00

    This book shows the risks and protections cyberspace offers for national security and information warfare. more...

  • Integrating ISA Server 2006 with Microsoft Exchange 2007by Fergus Strachan

    Elsevier Science 2011; US$ 51.95

    This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy... more...

  • Security Development Lifecycleby Michael Howard; Steve Lipner

    Microsoft Press 2006; US$ 27.99

    Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs?the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team... more...

  • The Security Development Lifecycleby Michael Howard; Steve Lipner

    O'Reilly Media, Inc. 2009; US$ 27.99

    Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs?the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide... more...

  • A Cyberworm that Knows No Boundariesby Isaac R. Porche III; Jerry M. Sollinger; Shawn McKay

    RAND Corporation 2011; US$ 9.95

    It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and... more...