The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cisco Network Security Troubleshooting Handbook, Adobe Readerby Mynul Hoda

    Pearson Education 2005; US$ 60.00

    Identify, analyze, and resolve current and potential network security problems  Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic... more...

  • The Complete Cisco VPN Configuration Guide, Adobe Readerby Richard Deal

    Pearson Education 2005; US$ 68.00

    Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution   A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including... more...

  • Cisco ASA, PIX, and FWSM Firewall Handbook, Adobe Readerby David Hucaby

    Pearson Education 2007; US$ 55.00

    Cisco ASA, PIX, and FWSM Firewall Handbook , Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including... more...

  • Network Security Hacksby Andrew Lockhart

    O'Reilly Media 2009; US$ 31.99

    In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for... more...

  • Creating a Web Site: The Missing Manualby Matthew MacDonald

    O'Reilly Media 2008; US$ 23.99

    Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence.... more...

  • Network Security Assessmentby Chris McNab

    O'Reilly Media 2004; US$ 27.99

    There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each... more...

  • Hacking Exposed Wireless, Second Editionby Johnny Cache; Joshua Wright; Vincent Liu

    McGraw-Hill Education 2010; US$ 49.99

    The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless , second edition reveals how attackers use readily available and custom tools... more...

  • IT Security Metrics: A Practical Framework for Measuring Security & Protecting Databy Lance Hayden

    McGraw-Hill Education 2010; US$ 49.99

    Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of... more...

  • Social Impacts of Digital Mediaby Justin Healey

    The Spinney Press 2011; US$ 22.50

    The rapid uptake of digital technologies has hugely impacted on the way we communicate, relate, learn, work, and spend our leisure time. Digital media literacy is the ability to access, understand and participate or create content using digital media. This ability is becoming integral to effective participation in the digital economy and Australian... more...

  • How to Be Invisibleby J.J. Luna

    St. Martin's Press 2004; US$ 7.99

    From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible , J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle... more...