The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Take Control of Your Online Privacyby Joe Kissell

    TidBITS 2015; US$ 15.00

    Learn what's private online (not much)--and what to do about it! Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you likely want to buy. In the... more...

  • iX kompakt 4/2013 - IPv6-Leitfadenby iX-Redaktion

    Heise Zeitschriften Verlag 2013; US$ 8.58

    Nichts geht im Internet ohne IP-Adresse. Seit der herkömmliche IPv4-Adressvorrat erschöpft ist, kommt allmählich Schwung in die Umsetzung der Nachfolgeversion IPv6. Obwohl das neue Internetprotokoll mehr zu bieten hat als einen praktisch unbegrenzten Adressraum, besteht immer noch ein großer Nachholbedarf bei Anwendern und Anbietern. Das Sonderheft... more...

  • c't Dossier: Kinder sicher im Netzby c't-Redaktion

    Heise Zeitschriften Verlag 2013; US$ 1.42

    Kinder sicher im Netz Für Kinder ab dem Vorschulalter sind PC, Tablet und Smartphone allgegenwärtig. Allerdings lauern im Internet Inhalte, die Kinder nachhaltig verstören können; dazu kommen teure Abzockfallen und das Risiko von Abmahnungen. Dieses E-Book hilft Eltern bei der schwierigen Aufgabe, ihre Kinder vor den Gefahren des Netzes zu schützen.... more...

  • Web Site Privacy with P3Pby Helena Lindskog; Stefan Lindskog

    Wiley 2003; US$ 40.00

    A cutting-edge, first look at how to embed and design a Web site compliant with the new personal privacy standard, P3P Introduces the P3P standard with detailed descriptions and then examines its parameters Includes helpful guidelines, explanations, and P3P how-to examples for system architects to follow Presents detailed case studies covering companies... more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities... more...

  • Multicast and Group Securityby Thomas Hardjono; Lakshminath Dondeti

    Artech House 2003; US$ 93.00

    A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication. more...

  • Intrusion Detection with Snortby Jack Koziol

    Pearson Education 2003; US$ 40.00

    With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide... more...

  • Configuring Check Point NGX VPN-1/Firewall-1by Barry J Stiefel; Simon Desmeules

    Elsevier Science 2005; US$ 51.95

    Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and... more...

  • Preventing Web Attacks with Apacheby Ryan C. Barnett

    Pearson Education 2006; US$ 43.99

    ?Ryan Barnett has raised the bar in terms of running Apache securely. If you run Apache, stop right now and leaf through this book; you need this information.? ?Stephen Northcutt, The SANS Institute   The only end-to-end guide to securing Apache Web servers and Web applications   Apache can be hacked. As companies have improved... more...

  • Network Security Fundamentalsby Gert DeLaet; Gert Schauwers

    Pearson Education 2004; US$ 51.99

    An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies... more...