The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- IT Governance Publishing 2012; US$ 75.00
21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical, linguistic and the authors personal experience to attempt to explain China to the uninitiated. The objective of the book is to raise awareness of the fact that the Peoples Republic of China is using a combination of their unique culture, language,... more...
- Helion 2012; US$ 15.00
Twoja lektura obowi?zkowa! iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple . Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform?... more...
- Packt Publishing 2013; US$ 26.99
Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge... more...
- Springer 2013; US$ 39.99
Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware... more...
- Packt Publishing 2013; US$ 26.99
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs."Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to... more...
- McGraw-Hill Education 2014; US$ 50.00
Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit , Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool?s function along with best practices for configuration and implementation... more...
- Pearson Education 2005; US$ 43.99
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...
- Wiley 2014; US$ 65.00
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now... more...
- Taylor and Francis 2013; US$ 89.95
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend... more...
- Summersdale Publishers Ltd. 2007; US$ 10.99
Includes information needed to get the most out of broadband. This book guides you through the decisions you make, from choosing the right anti-virus software to setting up a wireless network in your home. It contains chapters on instant messaging, downloading music, making phone calls from your computer and finding the best broadband websites. more...