The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Helion 2010; US$ 11.99
Poznaj i wykorzystaj mechanizmy testowania zabezpiecze?, a nikt nie prze?lizgnie si? przez Twoj? witryn?! Jak zainstalowa? i skonfigurowa? narz?dzia do testo more...
- TidBITS 2014; US$ 10.00
Overcome password frustration with Joe Kissell's expert advice! Updated January 24, 2014 Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic. Read the book to understand the problems... more...
- McGraw-Hill Education 2003; US$ 55.00
Your definitive Web Services security resource Minimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption,... more...
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskMcGraw-Hill Education 2012; US$ 60.00
N.K. McCarthy previously managed the Information Security Operations / Threat & Vulnerability Management for a Fortune 50 Corporation for several years. His international staff performed round-the-clock security event monitoring and response. His responsibilities included: security patch remediation, vulnerability scans, and remediation, penetration... more...
- Pearson Education 2005; US$ 63.99
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today?s newest,... more...
- O'Reilly Media 2009; US$ 27.99
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...
- Pearson Education 2007; US$ 47.99
Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader?s eyes." ?Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the must-read security books of the year." ?Cyrus Peikari, CEO, Airscanner... more...
- McGraw-Hill Education 2006; US$ 59.99
Completely revised to include the latest security tools, including wireless tools New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more New case... more...
- Pearson Education 2011; US$ 0.99
Remembering passwords is a pain, but having to change every account?s password because one of your accounts got hacked is an even bigger hassle. That?s why allowing your Mac to manage your passwords for you makes everything so much easier?not to mention more secure. It saves you time, too. A whole cottage industry of applications can store and manage... more...