The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- RAND Corporation 2014; US$ 9.95
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize... more...
- Springer 2006; US$ 169.00
Provides a view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. more...
- Elsevier Science 2006; US$ 51.95
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...
- McGraw-Hill Education 2013; US$ 50.00
Neil Bergman is a senior security consultant at Cigital, a leading software security firm, where he conducts and leads penetration testing, code review, and threat modeling of software on behalf of major organizations. Mike Stanfield is a security consultant at Cigital where he specializes in security assessments for the iOS, Android, and Blackberry... more...
- McGraw-Hill Education 2012; US$ 40.00
Ch 1. Introduction Ch 2. Deception Throughout History to Today Ch 3. The Applications & Goals of Cyber Counterintelligence Ch 4. The Missions and Outcomes of Criminal Profiling Ch 5. Legal & Ethical Aspects of Deception Ch 6. Attack Tradecraft Ch 7. Operational Deception Ch 8. Tools, Tactics & Procedures Ch 9. Attack Attribution Ch 10. Black... more...
- Atlantic Books Ltd 2012; US$ 12.38
Worm is the gripping story of the 'Conficker' virus- which, since its introduction in November 2008, has infected millions of computers around the world - and the cyber security elites who have joined forces in a high-tech game of cops and robbers to find its creators and defeat them. This dramatic cybercrime story travels from the Ukraine... more...
- McGraw-Hill Education 2014; US$ 50.00
Charles L. Brooks , MsCIS, CHFI, CEH, CISSP, CompTIA CTT+, owner and principal consultant at Security Technical Education, teaches at Brandeis University in the Rabb School/GPS MSIS program and facilitates online courses at Boston University. He has many years of experience in the IT security industry. more...
- Summersdale Publishers Ltd. 2007; US$ 10.99
Includes information needed to get the most out of broadband. This book guides you through the decisions you make, from choosing the right anti-virus software to setting up a wireless network in your home. It contains chapters on instant messaging, downloading music, making phone calls from your computer and finding the best broadband websites. more...
- Packt Publishing 2014; US$ 13.99
This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format.This tutorial-based guide is great for you if you want to conduct digital investigations with an integrated... more...
- McGraw-Hill Education 2013; US$ 50.00
Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company?s UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. David Endler ... more...