The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • What Stays in Vegasby Adam Tanner

    PublicAffairs 2014; US$ 27.99

    The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open... more...

  • The Smartphoneby Elizabeth Woyke

    New Press, The 2014; US$ 18.95

    We think we know everything about our smartphones. We use them constantly. We depend on them for every conceivable purpose. We are familiar with every inch of their compact frames. But there is more to the smartphone than meets the eye. How have smartphones shaped the way we socialize and interact? Who tracks our actions, our preferences, our movements... more...

  • Technocreepby Thomas P. Keenan

    Greystone Books 2014; US$ 17.95

    “Technology is rapidly moving into our bodies,? writes cyber expert Keenan, “and this book gives a chilling look ahead into where that road may lead us – on a one way trip to the total surrender of privacy and the commoditization of intimacy.? Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments,... more...

  • Information Governance and Securityby John G. Iannarelli; Michael O?Shaughnessy

    Elsevier Science 2014; US$ 54.95

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization?s most important asset?its proprietary information?safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and... more...

  • Anti-Hacker Tool Kit, Third Editionby Mike Shema; Chris Davis

    McGraw-Hill Education 2006; US$ 59.99

    Completely revised to include the latest security tools, including wireless tools New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more New case studies... more...

  • Blocking Spam & Spyware For Dummiesby Peter H. Gregory; Mike Simon

    Wiley 2005; US$ 19.99

    Fight back and save money with these expert tips Find out what spam and spyware cost your company, and how to stop them Whether yours is a one-person business or a multi-million dollar corporation, here's help giving spammers and spies the bum's rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up... more...

  • This Machine Kills Secretsby Andy Greenberg

    Penguin Group US 2012; US$ 12.99

    Who Are The Cypherpunks? This is the unauthorized telling of the revolutionary cryptography story behind the motion picture The Fifth Estate in theatres this October, and We Steal Secrets: The Story of Wikileaks , a documentary out now. WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers?... more...

  • Maximum Linux Security, Adobe Readerby Anonymous; John Ray

    Sams Publishing 2006; US$ 39.99

    Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...

  • The Art of Computer Virus Research and Defenseby Peter Szor

    Pearson Education 2005; US$ 43.99

    Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...

  • Security Metricsby Andrew Jaquith

    Pearson Education 2007; US$ 47.99

    This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations   Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing... more...