The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • How to Be Invisibleby J.J. Luna

    St. Martin's Press 2004; US$ 7.99

    From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible , J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle... more...

  • Black Codeby Ronald J. Deibert

    McClelland & Stewart 2013; US$ 17.95

    Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code , Ronald J. Deibert, a leading expert on digital... more...

  • WikiLeaksby David Leigh; Luke Harding

    PublicAffairs 2011; US$ 15.99

    A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its founder Julian Assange, and the ethical, legal, and political controversies it has both uncovered and provoked. more...

  • Custom Symantec Version of The Symantec Guide to Home Internet Securityby Andrew Conry-Murray; Vincent Weafer

    Pearson Education 2005; US$ 31.99

    Protect Yourself! Easy, Step-by-Step Help from the World’s Most Trusted Security Provider. The Internet is crawling with risks; if you bank or shop online, or even just surf the Web and send e-mail, you are exposed to hackers, thieves, and con artists. Today’s bad guys don’t need to pick your locks or break your windows: they can... more...

  • SSL and TLSby Rolf Oppliger

    Artech House 2009; US$ 89.00

    SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding... more...

  • Google Apps Mastering Integration and Customization by Médéric Morel; Manuel Alves; Pascal Cadet

    Packt Publishing 2011; US$ 23.99

    Scale your applications and projects onto the cloud with Google Apps. more...

  • Moodle 1.9 Top Extensions Cookbookby Michael de Raadt

    Packt Publishing 2010; US$ 26.99

    Over 60 simple and incredibly effective recipes for harnessing the power of the best Moodle modules to create effective online learning sites more...

  • Podstawy ochrony komputerówby Rick Lehtinen; Deborah Russell; Sr. G. T. Gangemi

    Helion 2012; US$ 10.00

    Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniaj?ce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany... more...

  • Hacking the Futureby Cole Stryker

    Overlook 2012; US$ 12.99

    How does anonymity enable free speech - and how is it a threat? "I think anonymity on the Internet has to go away," famously said by Randi Zuckerberg (sister of Mark), has become the policy for some, while the Stop Online Piracy Act mobilized millions to write Congress in protest. Identity Wars is a broad look at how anonymity influences politics,... more...

  • CISSP Rapid Reviewby Darril Gibson

    Microsoft Press 2012; US$ 23.99

    Assess your readiness for the CISSP Exam?and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources?all designed to help evaluate and reinforce your preparation. Bolster your exam prep with a... more...