The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Take Control of Your Online Privacyby Joe Kissell

    TidBITS 2015; US$ 15.00

    Learn what's private online (not much)--and what to do about it! Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you likely want to buy. In the... more...

  • iX kompakt 4/2013 - IPv6-Leitfadenby iX-Redaktion

    Heise Zeitschriften Verlag 2013; US$ 8.58

    Nichts geht im Internet ohne IP-Adresse. Seit der herkömmliche IPv4-Adressvorrat erschöpft ist, kommt allmählich Schwung in die Umsetzung der Nachfolgeversion IPv6. Obwohl das neue Internetprotokoll mehr zu bieten hat als einen praktisch unbegrenzten Adressraum, besteht immer noch ein großer Nachholbedarf bei Anwendern und Anbietern. Das Sonderheft... more...

  • c't Dossier: Kinder sicher im Netzby c't-Redaktion

    Heise Zeitschriften Verlag 2013; US$ 1.42

    Kinder sicher im Netz Für Kinder ab dem Vorschulalter sind PC, Tablet und Smartphone allgegenwärtig. Allerdings lauern im Internet Inhalte, die Kinder nachhaltig verstören können; dazu kommen teure Abzockfallen und das Risiko von Abmahnungen. Dieses E-Book hilft Eltern bei der schwierigen Aufgabe, ihre Kinder vor den Gefahren des Netzes zu schützen.... more...

  • Accumuloby Aaron Cordova; Billie Rinaldi; Michael Wall

    O'Reilly Media 2015; US$ 42.99

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google?s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.... more...

  • The Online Identity Theft Prevention Kitby Atlantic Publishing Company Atlantic Publishing Company

    Atlantic Publishing Group 2008; US$ 9.95

    Statistics about identity theft from the Federal Trade Commission (FTC) are staggering. The FTC now says that as many as one in every eight adults and one in every four households has been victimized by identity thieves in the past five years. To make matters even worse, if you end up a victim of identity theft, it can take years to clean up the mess.... more...

  • Wireless Network Security A Beginner's Guideby Tyler Wrightson

    McGraw-Hill Education 2012; US$ 42.00

    Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP,... more...

  • Hacking Exposed Wireless, Second Editionby Johnny Cache; Joshua Wright; Vincent Liu

    McGraw-Hill Education 2010; US$ 55.00

    The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless , second edition reveals how attackers use readily available and custom tools... more...

  • IT Security Metrics: A Practical Framework for Measuring Security & Protecting Databy Lance Hayden

    McGraw-Hill Education 2010; US$ 53.00

    Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those... more...

  • Web Site Privacy with P3Pby Helena Lindskog; Stefan Lindskog

    Wiley 2003; US$ 40.00

    A cutting-edge, first look at how to embed and design a Web site compliant with the new personal privacy standard, P3P Introduces the P3P standard with detailed descriptions and then examines its parameters Includes helpful guidelines, explanations, and P3P how-to examples for system architects to follow Presents detailed case studies covering companies... more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities... more...