The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Verschlüsselung im NSA-Zeitalterby Carsten Eilers 2014; Not Available

    Die NSA kann manche Verschlüsselungen brechen und nimmt Einfluss auf die Entwicklung von Kryptografiestandards. Wem, oder besser: welchen Verfahren ist noch zu trauen? Und wie setzt man sie sicher ein? In den ersten beiden Kapiteln geht Carsten Eilers, freier Berater und Coach für IT-Sicherheit und technischen Datenschutz, der Frage nach, wie sicher... more...

  • Android Securityby Carsten Eilers 2014; Not Available

    Cyberkriminalität: ein Wort - zahlreiche Facetten. Dieser shortcut befasst sich mit Android-Schadsoftware. Dabei geht es sowohl um Fake-Apps, Trojaner und Drive-by-Infektionen als auch um so genannte Spy Phones, mithilfe derer man etliche Nutzerdaten ausspähen kann: Angefangen von der GPS-Position über SMS oder Fotos bis hin zu getätigten Telefonaten... more...

  • Take Control of Your Passwordsby Joe Kissell

    TidBITS 2014; US$ 10.00

    Overcome password frustration with Joe Kissell's expert advice! Updated April 29, 2014 Improve your passwords without losing your cool, thanks to Joe Kissell's expert advice. Start on the path to modern password security by watching Joe's intro video and by checking out our "Joe of Tech" comic. Read the book to understand the problems... more...

  • Cybersecurity and Human Rights in the Age of Cyberveillanceby Joanna Kulesza; Roy Balleste

    Rowman & Littlefield Publishers 2015; US$ 79.99

    Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents contemporary perspectives on the limits of human rights in the international internet community. more...

  • Firewall Fundamentalsby Wes Noonan; Ido Dubrawsky

    Pearson Education 2006; US$ 45.99

    The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures, practical deployment scenarios, and common management... more...

  • IPSec Virtual Private Network Fundamentalsby James Henry Carmouche

    Pearson Education 2006; US$ 51.99

    An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...

  • Security Threat Mitigation and Responseby Dale Tesch; Greg Abelar

    Pearson Education 2006; US$ 50.00

    Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System   Dale Tesch Greg Abelar   While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...


    Elsevier Science 2005; US$ 195.00


  • Cloud Security and Privacyby Tim Mather; Subra Kumaraswamy; Shahed Latif

    O'Reilly Media 2009; US$ 27.99

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...