The Leading eBooks Store Online
3,788,875 members ⚫ 1,234,658 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Atlantic Publishing Group Inc 2014; US$ 12.48
Statistics about identity theft from the Federal Trade Commission (FTC) are staggering. The FTC now says that as many as one in every eight adults and one in every four households has been victimized by identity thieves in the past five years. more...
- Open Road Distribution 2015; US$ 9.99
The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation?s corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios... more...
- Amac-Buch Verlag 2013; US$ 0.00
Die Betriebssysteme der Smartphones und Tablets werden immer komfortabler und einfacher zu bedienen. Gleichzeitig sind sie immer mehr in der Lage, umfangreiche und komplexe Aufgaben zu erledigen. Daher landen zwangsläufig immer mehr sensible Daten auf den Geräten. Und ganz gleich, ob es Ihr Adressbuch ist oder sensible Daten Ihres Arbeitgebers:... more...
- Elsevier Science 2015; US$ 59.95
Google is the most popular search engine ever created, but Google?s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third... more...
- Rowman & Littlefield Publishers 2015; US$ 79.99
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents contemporary perspectives on the limits of human rights in the international internet community. more...
- ABC-CLIO 2016; US$ 75.00
How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security,... more...
- ABC-CLIO 2016; US$ 75.00
As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity?from copyright infringement to phishing to online pornography?has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts?if... more...
- ABC-CLIO 2016; US$ 89.00
The Internet has become for many people?especially students and young adults?an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access... more...
- Morgan & Claypool Publishers 2016; US$ 32.00
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive... more...
- Elsevier Science 2016; US$ 59.95
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization?s... more...