The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Learning Devise for Railsby Giovanni Sakti

    Packt Publishing 2013; US$ 17.99

    A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...

  • Privacy in the Age of Big Databy Theresa Payton; Ted Claypoole; Hon. Howard A. Schmidt

    Rowman & Littlefield Publishers 2014; US$ 17.99

    Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...

  • Online Safetyby Justin Healey

    The Spinney Press 2015; US$ 30.00

    Presents a range of cyber-safety tips on avoiding risks online and how to stay protected. A chapter in the book is dedicated to dealing with cyberbullying. Also includes: worksheets and activities, fast facts, glossary, web links, index. more...

  • Business Continuityby Bob Hayes; Kathleen Kotwica; Dean Correia

    Elsevier Science 2013; US$ 49.95

    The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization?s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after... more...

  • The Basics of Web Hackingby Josh Pauli

    Elsevier Science 2013; US$ 29.95

    Provides a simple and clean approach to Web Hacking, including hands-on examples and exercises that are designed to teach you how to Hack the Server, Hack the Web App, and Hack the Web User. Covers the most significant new tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more! Written by an author who works... more...

  • The Benefits and Security Risks of Web-Based Applications for Businessby Kathleen Kotwica

    Elsevier Science 2013; US$ 24.95

    Provides security executives and practitioners with an overview of how companies have begun to adopt web-based applications and tools for employee use Describes the benefits of web-based applications and warns of the potential risks associated with their use in the workplace Includes practical recommendations to mitigate the risks of web-based... more...

  • Hackers and Hacking: A Reference Handbookby Thomas Holt; Bernadette Schell

    ABC-CLIO 2013; US$ 58.00

    This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. more...

  • IT Security Metrics: A Practical Framework for Measuring Security & Protecting Databy Lance Hayden

    McGraw-Hill Education 2010; US$ 53.00

    Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of... more...

  • Penetration Testing with Perlby Douglas Berdeaux

    Packt Publishing 2014; US$ 26.99

    If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience. more...

  • Mastering FreeBSD and OpenBSD Securityby Yanek Korff; Paco Hope; Bruce Potter

    O'Reilly Media 2005; US$ 39.99

    FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators... more...