The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Counter Hack Reloadedby Edward Skoudis; Tom Liston

    Pearson Education 2005; US$ 63.99

    For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today?s newest,... more...

  • EUROSYMPOSIUM COMPUTER AIDED PROCESS ENGINEERINGby ESPUNA

    Elsevier Science 2005; US$ 195.00

    EUROSYMPOSIUM COMPUTER AIDED PROCESS ENGINEERING more...

  • Cloud Security and Privacyby Tim Mather; Subra Kumaraswamy; Shahed Latif

    O'Reilly Media 2009; US$ 27.99

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...

  • Virtual Honeypotsby Niels Provos; Thorsten Holz

    Pearson Education 2007; US$ 47.99

    Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader?s eyes." ?Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the must-read security books of the year." ?Cyrus Peikari, CEO, Airscanner... more...

  • Anti-Hacker Tool Kit, Third Editionby Mike Shema; Chris Davis; Aaron Philipp; David Cowen

    McGraw-Hill Education 2006; US$ 59.99

    Completely revised to include the latest security tools, including wireless tools New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more New case... more...

  • Manage passwords, with 1Passwordby Scott McNulty

    Pearson Education 2011; US$ 0.99

    Remembering passwords is a pain, but having to change every account?s password because one of your accounts got hacked is an even bigger hassle. That?s why allowing your Mac to manage your passwords for you makes everything so much easier?not to mention more secure. It saves you time, too. A whole cottage industry of applications can store and manage... more...

  • This Machine Kills Secretsby Andy Greenberg

    Penguin Publishing Group 2012; US$ 16.00

    At last, the first full account of the cypherpunks who aim to free the world?s institutional secrets, by Forbes journalist Andy Greenberg who has traced their shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond. WikiLeaks brought to light a new form of whistleblowing,... more...

  • Social Engineering in IT Security: Tools, Tactics, and Techniquesby Sharon Conheady

    McGraw-Hill Education 2014; US$ 40.00

    Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."-- Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security... more...

  • Deploying Microsoft Forefront Unified Access Gateway 2010by Thomas Shinder; Yuri Diogenes

    Pearson Education 2010; US$ 11.99

    Plan, design, and deploy Forefront United Access (UAG) with insights straight from the Forefront team at Microsoft. Forefront Unified Access Gateway (UAG)--the evolution of the Microsoft Intelligent Application Gateway (IAG)--delivers a more robust and transparent solution for inbound access from anywhere. This pragmatic guide drills into system components... more...

  • Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companionby Jim Harrison; Yuri Diogenes; Mohit Saxena

    Pearson Education 2010; US$ 47.99

    Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management... more...