The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cybersecurity and Human Rights in the Age of Cyberveillanceby Joanna Kulesza; Roy Balleste

    Rowman & Littlefield Publishers 2015; US$ 79.99

    Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents contemporary perspectives on the limits of human rights in the international internet community. more...

  • Datenschutz und Sicherheit - für iOS 7by Anton Ochsenkühn; Michael Krimmer

    Amac-Buch Verlag 2013; US$ 0.00

    Die Betriebssysteme der Smartphones und Tablets werden immer komfortabler und einfacher zu bedienen. Gleichzeitig sind sie immer mehr in der Lage, umfangreiche und komplexe Aufgaben zu erledigen. Daher landen zwangsläufig immer mehr sensible Daten auf den Geräten. Und ganz gleich, ob es Ihr Adressbuch ist oder sensible Daten Ihres Arbeitgebers:... more...

  • Deploying Zone-Based Firewalls (Digital Short Cut)by Ivan Pepelnjak

    Pearson Education 2006; US$ 14.99

    Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1   Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the grouping of physical and virtual interfaces into zones to simplify... more...

  • Email Security with Cisco IronPortby Chris Porter

    Pearson Education 2012; US$ 51.99

    Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today?s messaging environments and shows you how to systematically anticipate and respond to them using Cisco?s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows... more...

  • File System Forensic Analysisby Brian Carrier

    Pearson Education 2005; US$ 55.99

    The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques   Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian... more...

  • Google Hacking for Penetration Testers, Third Editionby Johnny Long; Bill Gardner; Justin Brown

    Elsevier Science 2015; US$ 59.95

    Google is the most popular search engine ever created, but Google?s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third... more...

  • Hacking Handbuchby Dr. Patrick Engebretson

    Franzis Verlag 2015; US$ 27.92

    Täglich liest man von neuen Sicherheitslücken und Hackern, die diese Lücken ausnutzen - sobald man selbst betroffen ist, weiß man, wie sich Datenklau und ein nicht funktionierendes IT-System anfühlen. Was kann man dagegen tun? Vorsorgen und Sicherheitslücken schließen. Dafür müssen Sie die Techniken und Werkzeuge der Hacker kennen und am besten selbst... more...

  • How Personal & Internet Security Worksby Preston Gralla

    Pearson Education 2006; US$ 23.99

    In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004.... more...

  • Internet Censorship: A Reference Handbookby Bernadette Schell

    ABC-CLIO 2014; US$ 58.00

    Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters.... more...

  • Introduction to Cybercrimeby Joshua Hill; Nancy Marion

    ABC-CLIO 2016; US$ 75.00

    As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity?from copyright infringement to phishing to online pornography?has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts?if... more...