The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Custom Symantec Version of The Symantec Guide to Home Internet Securityby Andrew Conry-Murray; Vincent Weafer

    Pearson Education 2005; US$ 31.99

    Protect Yourself! Easy, Step-by-Step Help from the World’s Most Trusted Security Provider. The Internet is crawling with risks; if you bank or shop online, or even just surf the Web and send e-mail, you are exposed to hackers, thieves, and con artists. Today’s bad guys don’t need to pick your locks or break your windows: they can... more...

  • SSL and TLSby Rolf Oppliger

    Artech House 2009; US$ 89.00

    SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding... more...

  • Google Apps Mastering Integration and Customization by Médéric Morel; Manuel Alves; Pascal Cadet

    Packt Publishing 2011; US$ 23.99

    Scale your applications and projects onto the cloud with Google Apps. more...

  • Moodle 1.9 Top Extensions Cookbookby Michael de Raadt

    Packt Publishing 2010; US$ 26.99

    Over 60 simple and incredibly effective recipes for harnessing the power of the best Moodle modules to create effective online learning sites more...

  • Podstawy ochrony komputerówby Rick Lehtinen; Deborah Russell; Sr. G. T. Gangemi

    Helion 2012; US$ 10.00

    Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniaj?ce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany... more...

  • Hacking the Futureby Cole Stryker

    Overlook 2012; US$ 12.99

    How does anonymity enable free speech - and how is it a threat? "I think anonymity on the Internet has to go away," famously said by Randi Zuckerberg (sister of Mark), has become the policy for some, while the Stop Online Piracy Act mobilized millions to write Congress in protest. Identity Wars is a broad look at how anonymity influences politics,... more...

  • CISSP Rapid Reviewby Darril Gibson

    Microsoft Press 2012; US$ 23.99

    Assess your readiness for the CISSP Exam?and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources?all designed to help evaluate and reinforce your preparation. Bolster your exam prep with a... more...

  • Business Continuityby Bob Hayes; Kathleen Kotwica; Dean Correia

    Elsevier Science 2013; US$ 49.95

    The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization?s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after... more...

  • The Benefits and Security Risks of Web-Based Applications for Businessby Kathleen Kotwica

    Elsevier Science 2013; US$ 24.95

    This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration,... more...

  • The Basics of Web Hackingby Josh Pauli

    Elsevier Science 2013; US$ 29.95

    The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers.... more...