The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2012; US$ 42.00
Part I: Wireless Foundations Chapter 1. Introduction to the Wireless Security Mindset Chapter 2. Wireless Tools and Gadgets Part II: Know Thy Enemy Chapter 3. Theory of Attacks on Wireless Networks Chapter 4. Attacking Wireless Networks Chapter 5. Attacking Wireless Clients Part III: Real-World Wireless Security Defenses Chapter 6.... more...
- Artech House 2009; US$ 109.00
SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a solid understanding... more...
- Packt Publishing 2011; US$ 23.99
Scale your applications and projects onto the cloud with Google Apps. more...
- McGraw-Hill Education 2012; US$ 50.00
1: Footprinting 2: Scanning 3: Enumeration 4. Hacking Windows 5. Hacking UNIX 6: Remote Connectivity and VoIP Hacking 7. Network Devices (Expanded) 8: Wireless Devices (Expanded) 9: Embedded Systems (NEW) 10: Web Hacking 11. Countermeasures Map (NEW) Appendix A: Ports Appendix B: Top 14 Security Vulnerabilities Appendix C: Denial of Service... more...
- Helion 2012; US$ 10.00
Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniaj?ce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany... more...
- McGraw-Hill Education 2012; US$ 40.00
Shon Harris, CISSP, is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Force?s Information Warfare unit, an instructor, and an author. She has authored several international bestselling books on information security published by McGraw-Hill Education and Pearson which have sold over a... more...
- McGraw-Hill Education 2014; US$ 50.00
Suzanne Widup has a wealth of experience in security engineering and analysis with a specialty in digital forensics in large enterprise environments. Her current work involves data breach research, including tracking publicly disclosed data breaches in the VERIS Community Database (VCDB). Suzanne is the founder of the Digital Forensics Association.... more...
- McGraw-Hill Education 2014; US$ 60.00
Jason T. Luttgens is a former technical director of the security consulting firm Mandiant where he led dozens of global investigations involving industrial espionage, cardholder data theft, and other crimes. A veteran of the U.S. Air Force, he served in the Office of Special Investigations and at the Department of Defense?s Computer Forensics Laboratory.... more...
- McGraw-Hill Education 2013; US$ 40.00
David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics . more...