The Leading eBooks Store Online
3,508,729 members ⚫ 2,065,349 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- O'Reilly Media 2009; US$ 27.99
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy , you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications... more...
- McGraw-Hill Education 2006; US$ 59.99
Completely revised to include the latest security tools, including wireless tools New tips on how to configure the recent tools on Linux, Windows, and Mac OSX New on the CD-ROM -- Gnoppix, a complete Linux system, ClamAV anti-virus, Cain, a multi-function hacking tool, Bluetooth tools, protocol scanners, forensic tools, and more New case studies... more...
- Pearson Education 2011; US$ 91.99
?In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today?s cybersecurity challenges. Their use of the threat?vulnerability?countermeasure paradigm combined with extensive real-world examples throughout results in a very effective... more...
- McGraw-Hill Education 2011; US$ 42.00
Security Smarts for the Self-Guided IT Professional ?Get to know the hackers?or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.? ?Ryan McGeehan, Security... more...
- Pearson Education 2011; US$ 27.99
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn how hacker attacks work,... more...
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskMcGraw-Hill Education 2012; US$ 60.00
Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...
- Elsevier Science 2013; US$ 49.95
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...
- Scientific American 2013; US$ 5.99
Cyber Hacking: Wars in Virtual Space by the editors of Scientific American Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door... more...
- McGraw-Hill Education 2014; US$ 40.00
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."-- Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses... more...