The Leading eBooks Store Online
3,693,353 members ⚫ 1,195,028 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Elsevier Science 2015; US$ 29.95
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy... more...
- Taylor and Francis 2016; US$ 89.95
Cyber security involves protecting organisations from cyber risks, the threats to organisations caused by digital technology. These risks can cause direct damage to revenues and profits as well as indirect damage through reduced efficiency, lower employee morale, and reputational damage. Cyber security is often thought to be the domain of specialist... more...
- ScottSchober.com Publishing 2016; US$ 9.99
Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked.As a small business owner, family man, and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company... more...
- Elsevier Science 2016; US$ 49.95
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT... more...
- Packt Publishing 2016; US$ 39.99
Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book: A straightforward guide to address the roadblocks face when doing mobile forensics; Simplify mobile forensics using the right mix of methods, techniques, and tools; Get valuable advice to put you in the mindset of a forensic professional, regardless... more...
- Sams Publishing 2006; US$ 39.99
Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...
- Wiley 2011; US$ 26.99 US$ 21.59
Firefox For Dummies gives you the inside scoop on the exciting new browser from the Web wizard that got it started. The book's author, Blake Ross, began developing Firefox as a teenager. Once available to the world, the simple and powerful tool was an instant hit claiming a sizable share of the Web browser market with over 140 million downloads.... more...
- Pearson Education 2005; US$ 63.99
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today?s newest,... more...
- O'Reilly Media 2006; US$ 31.99
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for... more...