The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • Markets for Cybercrime Tools and Stolen Databy Lillian Ablon; Martin C. Libicki; Andrea A. Golay

    RAND Corporation 2014; US$ 9.95

    Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize... more...

  • Surviving Cyberwarby Richard Stiennon

    Government Institutes 2010; US$ 38.99

    This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines... more...

  • Malware Analyst's Cookbook and DVDby Michael Ligh; Steven Adair; Blake Hartstein; Matthew Richard

    Wiley 2010; US$ 59.99

    A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written... more...

  • SpamAssassinby Alan Schwartz

    O'Reilly Media 2004; US$ 23.99

    The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation,... more...

  • The Healthy PC: Preventive Care, Home Remedies, and Green Computing, 2nd Editionby Guy Hart-Davis

    McGraw-Hill Education 2011; US$ 25.00

    Get your PC running at full speed again--and remove malevolent software Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing , Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for... more...

  • Database Nationby Simson Garfinkel

    O'Reilly Media 2000; US$ 13.99

    Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these... more...

  • Computer Security Basicsby Rick Lehtinen; Sr. G. T. Gangemi

    O'Reilly Media 2006; US$ 35.99

    This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge.... more...

  • CEH Certified Ethical Hacker All-in-One Exam Guideby Matt Walker; Angela Walker

    McGraw-Hill Education 2011; US$ 50.00

    Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions,... more...

  • The Art of Memory Forensicsby Michael Hale Ligh; Andrew Case; Jamie Levy; AAron Walters

    Wiley 2014; US$ 65.00

    Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now... more...

  • Intrusion Prevention and Active Responseby Michael Rash; Angela Orebaugh; Graham Clark

    Elsevier Science 2005; US$ 51.95

    This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application... more...