The Leading eBooks Store Online
3,788,875 members ⚫ 1,234,658 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Pearson Education 2011; US$ 91.99
?In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today?s cybersecurity challenges. Their use of the threat?vulnerability?countermeasure paradigm combined with extensive real-world examples throughout results in a very effective... more...
- Pearson Education 2011; US$ 27.99
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn how hacker attacks work,... more...
- McGraw-Hill Education 2011; US$ 42.00
Security Smarts for the Self-Guided IT Professional ?Get to know the hackers?or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out.? ?Ryan McGeehan, Security... more...
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at RiskMcGraw-Hill Education 2012; US$ 60.00
Uncertainty and risk, meet planning and action. Reinforce your organization?s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents... more...
- Elsevier Science 2013; US$ 49.95
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people?s lives and is now becoming a significant driving force in business. These new platforms have provided... more...
- Scientific American 2013; US$ 5.09
Cyber Hacking: Wars in Virtual Space by the editors of Scientific American Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door... more...
- McGraw-Hill Education 2014; US$ 40.00
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."-- Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses... more...
- TidBITS 2015; US$ 10.00
Updated January 13, 2015 Protect your Mac's data in the event of theft with Apple's FileVault! If your Mac were stolen, would you worry about the thief seeing your email, photos, financial data, and other sensitive information? OS X?s built-in FileVault encryption technology ensures that your Mac?s contents are safe from prying eyes, but if you?re... more...
- ABC-CLIO 2012; US$ 41.00
The members of the current generation of "digital guinea pigs" are true social pioneers as they embrace digital technology to create a new realm of mating, dating, and intimacy in America. Ironically, "digital dating" frequently results in an outcome that is exactly opposite to its participants' intended purposes. The Illusion of Intimacy: Problems... more...