The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • No Place to Hideby Glenn Greenwald

    Henry Holt and Co. 2014; US$ 27.99

    In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency?s widespread,... more...

  • Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companionby Jim Harrison; Yuri Diogenes; Mohit Saxena

    Pearson Education 2010; US$ 47.99

    Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management... more...

  • Social Engineering in IT Security: Tools, Tactics, and Techniquesby Sharon Conheady

    McGraw-Hill Education 2014; US$ 40.00

    Cutting-edge social engineering testing techniques Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance,... more...

  • File System Forensic Analysisby Brian Carrier

    Pearson Education 2005; US$ 63.99

    The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. more...

  • How Personal & Internet Security Works, Adobe Readerby Preston Gralla

    Pearson Education 2006; US$ 23.99

    In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004.... more...

  • Deploying Zone-Based Firewalls (Digital Short Cut)by Ivan Pepelnjak

    Pearson Education 2006; US$ 14.99

    Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1   Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the grouping of physical and virtual interfaces into zones to simplify... more...

  • Firewall Fundamentalsby Wes Noonan; Ido Dubrawsky

    Pearson Education 2006; US$ 45.99

    The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...

  • IPSec Virtual Private Network Fundamentalsby James Henry Carmouche

    Pearson Education 2006; US$ 51.99

    An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...

  • Cheating Online Games (Digital Short Cut)by Gary McGraw; Greg Hoglund

    Pearson Education 2006; US$ 14.99

    This digital Short Cut, delivered in Adobe PDF format for quick and easy access, is an introduction to issues with cheating and anti-cheating countermeasures in the online gaming industry.   At present, the online game World of Warcraft has approximately six million subscribers worldwide. At any given time, 500,000 people are logged in and... more...