The Leading eBooks Store Online
3,725,826 members ⚫ 1,209,635 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Packt Publishing 2016; US$ 39.99
Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book: A straightforward guide to address the roadblocks face when doing mobile forensics; Simplify mobile forensics using the right mix of methods, techniques, and tools; Get valuable advice to put you in the mindset of a forensic professional, regardless... more...
- Springer US 2006; US$ 126.87
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and... more...
- Elsevier Science 2006; US$ 51.95
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering... more...
- McGraw-Hill Education 2013; US$ 50.00 US$ 45.00
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders... more...
- McGraw-Hill Education 2012; US$ 42.00 US$ 37.80
In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. ... more...
- McGraw-Hill Education 2016; US$ 60.00 US$ 54.00
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the... more...
- O'Reilly Media 2015; US$ 42.99
Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence... more...
- Atlantic Books 2012; US$ 9.99
Worm is the gripping story of the 'Conficker' virus- which, since its introduction in November 2008, has infected millions of computers around the world - and the cyber security elites who have joined forces in a high-tech game of cops and robbers to find its creators and defeat them. This dramatic cybercrime story travels from the Ukraine to... more...
- O'Reilly Media 2015; US$ 25.99
- Wiley 2017; US$ 40.00 US$ 33.99
Cybersecurity Essentials is organized into four parts that cover the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Each part begins with a chapter summarizing the fundamental concepts of that challenge, including real-world... more...