The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Managing Cyber Risk in the Financial Sectorby Ruth Taplin

    Taylor and Francis 2016; US$ 54.95

    Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information (?big... more...

  • Android Securityby Carsten Eilers

    entwickler.press 2014; Not Available

    Cyberkriminalität: ein Wort - zahlreiche Facetten. Dieser shortcut befasst sich mit Android-Schadsoftware. Dabei geht es sowohl um Fake-Apps, Trojaner und Drive-by-Infektionen als auch um so genannte Spy Phones, mithilfe derer man etliche Nutzerdaten ausspähen kann: Angefangen von der GPS-Position über SMS oder Fotos bis hin zu getätigten Telefonaten... more...

  • Cheating Online Games (Digital Short Cut)by Gary McGraw; Greg Hoglund

    Pearson Education 2006; US$ 14.99

    This digital Short Cut, delivered in Adobe PDF format for quick and easy access, is an introduction to issues with cheating and anti-cheating countermeasures in the online gaming industry.   At present, the online game World of Warcraft has approximately six million subscribers worldwide. At any given time, 500,000 people are logged in and... more...

  • Cisco ASAby Jazib Frahim; Omar Santos; Andrew Ossipov

    Pearson Education 2014; US$ 66.99

    Cisco ®  ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition   Identify, mitigate, and respond to today?s highly-sophisticated network attacks.   Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services... more...

  • Cisco Firewall Technologies (Digital Short Cut)by Andrew Mason

    Pearson Education 2007; US$ 9.99

    Cisco Firewall Technologies (Digital Short Cut) Andrew Mason ISBN-10: 1-58705-329-2 ISBN-13: 978-1-58705-329-0   Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these technologies are represented in the Cisco® firewall... more...

  • Cisco Secure Firewall Services Module (FWSM)by Ray Blair; Arvind Durai

    Pearson Education 2008; US$ 52.00

    This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.   The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors... more...

  • The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Riskby N.K. McCarthy; Matthew Todd; Jeff Klaben

    McGraw-Hill Education 2012; US$ 60.00

    Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...

  • Cyber Threatby Chris Bronk

    ABC-CLIO 2016; US$ 75.00

    How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security,... more...

  • Cybersecurity and Human Rights in the Age of Cyberveillanceby Joanna Kulesza; Roy Balleste

    Rowman & Littlefield Publishers 2015; US$ 79.99

    Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents contemporary perspectives on the limits of human rights in the international internet community. more...

  • Datenschutz und Sicherheit - für iOS 7by Anton Ochsenkühn; Michael Krimmer

    Amac-Buch Verlag 2013; US$ 0.00

    Die Betriebssysteme der Smartphones und Tablets werden immer komfortabler und einfacher zu bedienen. Gleichzeitig sind sie immer mehr in der Lage, umfangreiche und komplexe Aufgaben zu erledigen. Daher landen zwangsläufig immer mehr sensible Daten auf den Geräten. Und ganz gleich, ob es Ihr Adressbuch ist oder sensible Daten Ihres Arbeitgebers:... more...