The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- McGraw-Hill Education 2015; US$ 40.00
Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, a security consultant, an engineer in the U.S. Air Force?s Information Warfare unit, an instructor, and a bestselling author. She consulted with Fortune 100 corporations and government agencies on extensive security issues. more...
- Packt Publishing 2015; US$ 26.99
If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you. more...
- McGraw-Hill Education 2015; US$ 60.00
Part I: Law & Ethics 1: Ethical Hacking and the Legal System Part II: Crash Course: Preparing for the War 2 Programming Survival Skill3 Passive Analysis4 Advanced Reverse Engineering with IDA Pro 5 Intelligent Fuzzing 6 Shellcode Strategies7 Writing Linux Shellcode Part III: From Vulnerability to Exploit 8: Spoofing Based Attacks 9: Exploiting Cisco... more...
- Packt Publishing 2014; US$ 17.99
Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security. more...
- McGraw-Hill Education 2014; US$ 70.00
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) has served in IT security roles at Hewlett-Packard, Lockheed Martin, and the Marshall Space Flight Center. He was the director of the Network Training Center and the curriculum lead and senior instructor for the local Cisco Networking Academy on Ramstein AB, Germany. more...
- McGraw-Hill Education 2014; US$ 50.00
Charles L. Brooks , MsCIS, CHFI, CEH, CISSP, CompTIA CTT+, owner and principal consultant at Security Technical Education, teaches at Brandeis University in the Rabb School/GPS MSIS program and facilitates online courses at Boston University. He has many years of experience in the IT security industry. more...
- O'Reilly Media 2014; US$ 21.99
"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings , an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposé explores the shadowy world of the people responsible for today?s junk-email epidemic.... more...
- Packt Publishing 2014; US$ 20.99
If you are a developer with some Android knowledge, but you do not know how to test your applications using Android Studio, this book will guide you. It is recommended that you are familiar with Android Studio IDE. more...
- McGraw-Hill Education 2014; US$ 30.00
Matt Walker, CEH, CPTS , is an IT security architect working for Hewlett-Packard. He has held a variety of networking and IT security positions, including most recently the IT security manager position at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract). more...
- Wiley 2014; US$ 65.00
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now... more...