The Leading eBooks Store Online
3,720,765 members ⚫ 1,207,593 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- IT Governance Ltd 2012; US$ 150.00
This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People?s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. more...
- Helion 2012; US$ 15.00
Twoja lektura obowi?zkowa! iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple . Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform?... more...
- McGraw-Hill Education 2015; US$ 65.00 US$ 58.50
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves... more...
- Packt Publishing 2013; US$ 26.99
Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge... more...
- Springer New York 2013; US$ 37.29
Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware... more...
- Packt Publishing 2013; US$ 26.99
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to... more...
- McGraw-Hill Education 2014; US$ 50.00 US$ 45.00
Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit , Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool?s function along with best practices for configuration and implementation... more...
- O'Reilly Media 2015; US$ 25.99
- Pearson Education 2005; US$ 43.99
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...
- Wiley 2014; US$ 65.00 US$ 56.33
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now... more...