The Leading eBooks Store Online

3,693,353 members ⚫ 1,195,028 ebooks

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

  • Mobile Forensics – Advanced Investigative Strategiesby Oleg Afonin; Vladimir Katalov

    Packt Publishing 2016; US$ 39.99

    Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book: A straightforward guide to address the roadblocks face when doing mobile forensics; Simplify mobile forensics using the right mix of methods, techniques, and tools; Get valuable advice to put you in the mindset of a forensic professional, regardless... more...

  • CEH Certified Ethical Hacker All-in-One Exam Guide, Third Editionby Matt Walker

    McGraw-Hill Education 2016; US$ 50.00 US$ 41.00

    Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH... more...

  • CISSP Practice Exams, Fourth Editionby Shon Harris; Jonathan Ham

    McGraw-Hill Education 2016; US$ 45.00 US$ 36.90

    Complete, up-to-date coverage of the 2015 CISSP exam, including 1250+ realistic practice questions Fully updated and featuring new exam question formats, this self- study tool contains more than 1250 realistic practice exam questions and offers 100% coverage of the 2015 CISSP Common Body of Knowledge. In-depth explanations of both the correct and... more...

  • Kali Linux 2: Windows Penetration Testingby Wolf Halton; Bo Weaver

    Packt Publishing 2016; US$ 39.99

    Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book: Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux; Footprint, monitor, and audit your network and investigate any ongoing infestations; Customize Kali Linux with this professional guide so it... more...

  • CISSP All-in-One Exam Guide, Seventh Editionby Shon Harris; Fernando Maymi

    McGraw-Hill Education 2016; US$ 80.00 US$ 65.60

    Completely revised and updated for the 2015 CISSP body of knowledge, this new edition by Fernando Maymě continues Shon Harris?s bestselling legacy, providing a comprehensive overhaul of the content that is the leading chosen resource for CISSP exam success, and has made Harris the #1 name in IT security certification. This bestselling self-study... more...

  • Automatic Defense Against Zero-day Polymorphic Worms in Communication Networksby Mohssen Mohammed; Al-Sakib Khan Pathan

    CRC Press 2016; US$ 94.95

    Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend... more...

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; US$ 28.00

    ?A consistently eye-opening history...not just a page-turner but consistently surprising.? ? The New York Times ?A book that grips, informs, and alarms, finely researched and lucidly related.? ?John le Carré As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming... more...

  • Learning Network Forensicsby Samir Datt

    Packt Publishing 2016; US$ 39.99

    Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book: Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic; Connect the dots by understanding web proxies, firewalls, and routers to close in on your... more...

  • Mastering Kali Linux Wireless Pentestingby Jilumudi Raghu Ram; Brian Sak

    Packt Publishing 2016; US$ 39.99

    Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux About This Book: Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks; Perform advanced wireless assessment and penetration... more...

  • Essential Cybersecurity Scienceby Josiah Dykstra

    O'Reilly Media 2015; US$ 42.99

    If you?re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You?ll learn how to conduct scientific experiments on everyday tools and procedures, whether you?re evaluating... more...