The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- O'Reilly Media 2009; US$ 27.99
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...
- Pearson Education 2007; US$ 47.99
Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader?s eyes." ?Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the must-read security books of the year." ?Cyrus Peikari, CEO, Airscanner... more...
- McGraw-Hill Education 2011; US$ 40.00
Security Smarts for the Self-Guided IT Professional ?Get to know the hackers?or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.? ?Ryan McGeehan, Security... more...
- Penguin Group US 2012; US$ 9.99
Who Are The Cypherpunks? This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, and We Steal Secrets: The Story of Wikileaks , a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide... more...
- Packt Publishing 2014;
A complete guide with code snippets and real-world examples of tasks required during NSE development.Each chapter covers an important aspect of NSE and its related scan tasks. The book also includes full explanations of scripts to help you fully understand their functionality.The book takes a ground-up approach to introducing you to NSE development.... more...
- Pearson Education 2010; US$ 11.99
Plan, design, and deploy Forefront United Access (UAG) with insights straight from the Forefront team at Microsoft. Forefront Unified Access Gateway (UAG)--the evolution of the Microsoft Intelligent Application Gateway (IAG)--delivers a more robust and transparent solution for inbound access from anywhere. This pragmatic guide drills into system components... more...
- Pearson Education 2010; US$ 11.99
Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and... more...
- Wiley 2005; US$ 19.99
Fight back and save money with these expert tips Find out what spam and spyware cost your company, and how to stop them Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up... more...
- Rowman & Littlefield Publishers 2014; US$ 17.99
Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...