The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- O'Reilly Media 2004; US$ 27.99
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each... more...
- O'Reilly Media 2005; US$ 27.99
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted... more...
- O'Reilly Media 2009; US$ 31.99
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books... more...
- O'Reilly Media 2005; US$ 19.99
Firefox Hacks is ideal for power users who want to take full advantage of Firefox from Mozilla, the next-generation web browser that is rapidly subverting Internet Explorer's once-dominant audience. It's also the first book that specifically dedicates itself to this technology. Firefox is winning such widespread approval for a number of reasons,... more...
- McGraw-Hill Education 2010; US$ 49.99
The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless , second edition reveals how attackers use readily available and custom... more...
- McGraw-Hill Education 2010; US$ 49.99
Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of... more...
- The Spinney Press 2011; US$ 22.50
The rapid uptake of digital technologies has hugely impacted on the way we communicate, relate, learn, work, and spend our leisure time. Digital media literacy is the ability to access, understand and participate or create content using digital media. This ability is becoming integral to effective participation in the digital economy and Australian... more...
- McClelland & Stewart 2013; US$ 17.95
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code , Ronald J. Deibert, a leading expert on digital... more...
- Pearson Education 2005; US$ 31.99
Protect Yourself! Easy, Step-by-Step Help from the World’s Most Trusted Security Provider. The Internet is crawling with risks; if you bank or shop online, or even just surf the Web and send e-mail, you are exposed to hackers, thieves, and con artists. Today’s bad guys don’t need to pick your locks or break your windows: they can... more...