The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • IPSec Virtual Private Network Fundamentalsby James Henry Carmouche

    Pearson Education 2006; US$ 51.99

    An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory... more...

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...

  • Learning Bitcoinby Richard Caetano

    Packt Publishing 2015; US$ 35.99

    Embrace the new world of fiance by leveraging the power of crypto-currencies using Bitcoin and the Blockchain About This Book: Set up your own wallet, buy and sell Bitcoin, and execute custom transactions on the Blockchain; Leverage the power of Bitcoin to reduce transaction costs and eliminate fraud; A practical step-by-step guide to break down the... more...

  • Mastering Python Forensicsby Michael Spreitzenbarth; Johann Uhrmann

    Packt Publishing 2015; US$ 31.99

    Master the art of digital forensics and analysis with Python About This Book: Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworks; Analyze Python scripts to extract metadata and investigate forensic artifacts; The writers, Dr. Michael Spreitzenbarth... more...

  • Mobile Data Lossby Michael T. Raggo

    Elsevier Science 2015; US$ 29.95

    The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy... more...

  • Network Security First-Stepby Thomas M. Thomas; Donald Stoddard

    Pearson Education 2011; US$ 27.99

    Network Security first-step Second Edition   Tom Thomas and Donald Stoddard   Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy   Your first step to network security begins here! Learn how hacker attacks work,... more...

  • Programming Windows Identity Foundationby Vittorio Bertocci

    Pearson Education 2010; US$ 27.99

    Get hands-on guidance designed to help you put the newest .NET Framework component- Windows Identity Foundation, the identity and access logic for all on-premises and cloud development- to work. more...

  • Security Threat Mitigation and Responseby Dale Tesch; Greg Abelar

    Pearson Education 2006; US$ 50.00

    Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System   Dale Tesch Greg Abelar   While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...

  • Social Engineering in IT Security: Tools, Tactics, and Techniquesby Sharon Conheady

    McGraw-Hill Education 2014; US$ 40.00

    Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."-- Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses... more...

  • Swipedby Adam Levin; Beau Friedlander

    PublicAffairs 2015; US$ 24.99

    Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless... more...