The Leading eBooks Store Online

3,637,813 members ⚫ 1,169,093 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • The Online Identity Theft Prevention Kitby Atlantic Publishing Company trade

    Atlantic Publishing Group Inc 2014; US$ 12.48

    Statistics about identity theft from the Federal Trade Commission (FTC) are staggering. The FTC now says that as many as one in every eight adults and one in every four households has been victimized by identity thieves in the past five years. more...

  • The Rise of the Computer Stateby David Burnham

    Open Road Distribution 2015; US$ 9.99

    The Rise of the Computer State  is a comprehensive examination of the ways that computers and massive databases are enabling the nation?s corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios... more...

  • Datenschutz und Sicherheit - für iOS 7by Anton Ochsenkühn; Michael Krimmer

    Amac-Buch Verlag 2013; US$ 0.00

    Die Betriebssysteme der Smartphones und Tablets werden immer komfortabler und einfacher zu bedienen. Gleichzeitig sind sie immer mehr in der Lage, umfangreiche und komplexe Aufgaben zu erledigen. Daher landen zwangsläufig immer mehr sensible Daten auf den Geräten. Und ganz gleich, ob es Ihr Adressbuch ist oder sensible Daten Ihres Arbeitgebers:... more...

  • You: For Saleby Stuart Sumner

    Elsevier Science 2015; US$ 39.95

    Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which... more...

  • Google Hacking for Penetration Testersby Johnny Long; Bill Gardner; Justin Brown

    Elsevier Science 2015; US$ 59.95

    Google is the most popular search engine ever created, but Google?s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third... more...

  • Cybersecurity and Human Rights in the Age of Cyberveillanceby Joanna Kulesza; Roy Balleste

    Rowman & Littlefield Publishers 2015; US$ 79.99

    Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents contemporary perspectives on the limits of human rights in the international internet community. more...

  • Cyber Threatby Chris Bronk

    ABC-CLIO 2016; US$ 75.00

    How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security,... more...

  • Introduction to Cybercrimeby Joshua Hill; Nancy Marion

    ABC-CLIO 2016; US$ 75.00

    As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity?from copyright infringement to phishing to online pornography?has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts?if... more...

  • Online Health and Safety: From Cyberbullying to Internet Addictionby Bernadette Schell

    ABC-CLIO 2016; US$ 89.00

    The Internet has become for many people?especially students and young adults?an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access... more...

  • Implementing Digital Forensic Readinessby Jason Sachowski

    Elsevier Science 2016; US$ 59.95

    Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization?s... more...