The Leading eBooks Store Online
3,508,729 members ⚫ 2,065,349 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- TidBITS 2015; US$ 10.00
Updated January 13, 2015 Protect your Mac's data in the event of theft with Apple's FileVault! If your Mac were stolen, would you worry about the thief seeing your email, photos, financial data, and other sensitive information? OS X?s built-in FileVault encryption technology ensures that your Mac?s contents are safe from prying eyes, but if you?re... more...
- RP Media 2014; US$ 9.99
A book for yourself, a friend, a relative, and anyone else who needs help mastering email, Internet, and web essentials. Every year millions of people get access to the Internet. People that jump right in with both feet often have problems and become frustrated. But learning email, Internet and web essentials doesn't have to be a frustrating experience,... more...
- Packt Publishing 2015; US$ 31.99
Master the art of digital forensics and analysis with Python About This Book: Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworks; Analyze Python scripts to extract metadata and investigate forensic artifacts; The writers, Dr. Michael Spreitzenbarth... more...
- Packt Publishing 2015; US$ 35.99
Embrace the new world of fiance by leveraging the power of crypto-currencies using Bitcoin and the Blockchain About This Book: Set up your own wallet, buy and sell Bitcoin, and execute custom transactions on the Blockchain; Leverage the power of Bitcoin to reduce transaction costs and eliminate fraud; A practical step-by-step guide to break down the... more...
- Packt Publishing 2015; US$ 27.99
Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around About This Book: This book has been completely updated for ASP.NET Web API 2.0 including the new features of ASP.NET Web API such as Cross-Origin Resource Sharing (CORS) and OWIN self-hosting; Learn various techniques to secure ASP.NET... more...
- Elsevier Science 2015; US$ 29.95
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy... more...
- Taylor and Francis 2016; US$ 89.95
Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist... more...
- ScottSchober.com Publishing 2016; US$ 9.99
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.As a small business owner, family man, and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company... more...
- Sams Publishing 2006; US$ 39.99
Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...