The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Take Control of Your Passwordsby Joe Kissell

    TidBITS 2014; US$ 10.00

    Overcome password frustration with Joe Kissell's expert advice! Updated January 24, 2014 Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic. Read the book to understand the problems... more...

  • Web Services Securityby Mark O'Neill

    McGraw-Hill Education 2003; US$ 55.00

    Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You?ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more. more...

  • Email Security with Cisco IronPortby Chris Porter

    Pearson Education 2012; US$ 51.99

    Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today?s messaging environments and shows you how to systematically anticipate and respond to them using Cisco?s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows... more...

  • Programming Windows Identity Foundationby Vittorio Bertocci

    Pearson Education 2010; US$ 27.99

    Get hands-on guidance designed to help you put the newest .NET Framework component- Windows Identity Foundation, the identity and access logic for all on-premises and cloud development- to work. more...

  • CEH Certified Ethical Hacker Practice Exams, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 30.00

    Don't Let the Real Test Be Your First Test! Fully updated for the CEH v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

  • Blocking Spam & Spyware For Dummiesby Peter H. Gregory; Mike Simon

    Wiley 2005; US$ 24.99

    Fight back and save money with these expert tips Find out what spam and spyware cost your company, and how to stop them Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up... more...

  • Counter Hack Reloadedby Edward Skoudis; Tom Liston

    Pearson Education 2005; US$ 63.99

    ?I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn?t make any sense. I asked other people and they didn?t seem to know how these things work, or at least they couldn?t explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools... more...

  • EUROSYMPOSIUM COMPUTER AIDED PROCESS ENGINEERINGby ESPUNA

    Elsevier Science 2005; US$ 195.00

    EUROSYMPOSIUM COMPUTER AIDED PROCESS ENGINEERING more...

  • Cloud Security and Privacyby Tim Mather; Subra Kumaraswamy; Shahed Latif

    O'Reilly Media 2009; US$ 27.99

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...

  • Virtual Honeypotsby Niels Provos; Thorsten Holz

    Pearson Education 2007; US$ 47.99

    Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader?s eyes." ?Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the must-read security books of the year." ?Cyrus Peikari, CEO, Airscanner... more...