The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Deploying Zone-Based Firewalls (Digital Short Cut)by Ivan Pepelnjak

    Pearson Education 2006; US$ 14.99

    Deploying Zone-Based Firewalls (Digital Short Cut) Ivan Pepelnjak ISBN: 1-58705-310-1   Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the grouping of physical and virtual interfaces into zones to simplify... more...

  • Email Security with Cisco IronPortby Chris Porter

    Pearson Education 2012; US$ 51.99

    Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today?s messaging environments and shows you how to systematically anticipate and respond to them using Cisco?s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows... more...

  • File System Forensic Analysisby Brian Carrier

    Pearson Education 2005; US$ 55.99

    The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques   Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian... more...

  • Google Hacking for Penetration Testersby Johnny Long; Bill Gardner; Justin Brown

    Elsevier Science 2015; US$ 59.95

    Google is the most popular search engine ever created, but Google?s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third... more...

  • Hacking Handbuchby Dr. Patrick Engebretson

    Franzis Verlag 2015; US$ 27.92

    Täglich liest man von neuen Sicherheitslücken und Hackern, die diese Lücken ausnutzen - sobald man selbst betroffen ist, weiß man, wie sich Datenklau und ein nicht funktionierendes IT-System anfühlen. Was kann man dagegen tun? Vorsorgen und Sicherheitslücken schließen. Dafür müssen Sie die Techniken und Werkzeuge der Hacker kennen und am besten selbst... more...

  • How Personal & Internet Security Worksby Preston Gralla

    Pearson Education 2006; US$ 23.99

    In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004.... more...

  • Internet Censorship: A Reference Handbookby Bernadette Schell

    ABC-CLIO 2014; US$ 58.00

    Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters.... more...

  • Introduction to Cybercrimeby Joshua Hill; Nancy Marion

    ABC-CLIO 2016; US$ 75.00

    As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity?from copyright infringement to phishing to online pornography?has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts?if... more...

  • LAN Switch Securityby Eric Vyncke; Christopher Paggen

    Pearson Education 2007; US$ 55.99

    Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration... more...

  • OWASP Top 10by Tobias Zander

    entwickler.press 2015; Not Available

    Sicherheit im Web ist ein immerwährendes Thema, dem durch gewisse Vorfälle, wie dem NSA-Skandal, stetig mehr Aufmerksamkeit zuteilwurde. Der größte Teil der Sicherheitslücken ist auf dem Web Application Layer zu verorten. Das Open Web Application Security Project (OWASP) untersucht die dort zu findenden Sicherheitslücken und stellt Lösungen bereit,... more...