The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Anti-Hacker Tool Kit, Third Editionby Mike Shema; Chris Davis; Aaron Philipp; David Cowen

    McGraw-Hill Education 2006; US$ 59.99

    Completely revised to include the latest security tools, including wireless tools New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more New case studies... more...

  • Web Application Security, A Beginner's Guideby Bryan Sullivan; Vincent Liu

    McGraw-Hill Education 2011; US$ 40.00

    Security Smarts for the Self-Guided IT Professional ?Get to know the hackers?or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.? ?Ryan McGeehan, Security... more...

  • This Machine Kills Secretsby Andy Greenberg

    Penguin Group US 2012; US$ 9.99

    Who Are The Cypherpunks? This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, and We Steal Secrets: The Story of Wikileaks , a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide... more...

  • Mastering Nmap Scripting Engineby Paulino Calderón Pale

    Packt Publishing 2014;

    A complete guide with code snippets and real-world examples of tasks required during NSE development.Each chapter covers an important aspect of NSE and its related scan tasks. The book also includes full explanations of scripts to help you fully understand their functionality.The book takes a ground-up approach to introducing you to NSE development.... more...

  • Deploying Microsoft Forefront Unified Access Gateway 2010by Thomas Shinder; Yuri Diogenes

    Pearson Education 2010; US$ 11.99

    Plan, design, and deploy Forefront United Access (UAG) with insights straight from the Forefront team at Microsoft. Forefront Unified Access Gateway (UAG)--the evolution of the Microsoft Intelligent Application Gateway (IAG)--delivers a more robust and transparent solution for inbound access from anywhere. This pragmatic guide drills into system components... more...

  • Deploying Microsoft Forefront Threat Management Gateway 2010by Thomas Shinder; Yuri Diogenes

    Pearson Education 2010; US$ 11.99

    Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and... more...

  • Privacy in the Age of Big Databy Theresa M. Payton; Ted Claypoole; Hon. Howard A. Schmidt

    Rowman & Littlefield Publishers 2014; US$ 17.99

    Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...

  • Hackers Wantedby Martin C. Libicki; David Senty; Julia Pollak

    RAND Corporation 2014; US$ 9.95

    The perceived shortage of cybersecurity professionals working on national security may endanger the nation?s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession... more...

  • Maximum Linux Security, Adobe Readerby Anonymous; John Ray

    Sams Publishing 2006; US$ 39.99

    Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...

  • The Art of Computer Virus Research and Defenseby Peter Szor

    Pearson Education 2005; US$ 43.99

    Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...