The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Podstawy ochrony komputerówby Rick Lehtinen; Deborah Russell; Sr. G. T. Gangemi

    Helion 2012; US$ 10.00

    Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniaj?ce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany... more...

  • Hacking the Futureby Cole Stryker

    Overlook 2012; US$ 12.99

    How does anonymity enable free speech - and how is it a threat? "I think anonymity on the Internet has to go away," famously said by Randi Zuckerberg (sister of Mark), has become the policy for some, while the Stop Online Piracy Act mobilized millions to write Congress in protest. Identity Wars is a broad look at how anonymity influences politics,... more...

  • CISSP Rapid Reviewby Darril Gibson

    Microsoft Press 2012; US$ 23.99

    Assess your readiness for the CISSP Exam?and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources?all designed to help evaluate and reinforce your preparation. Bolster your exam prep with a... more...

  • Business Continuityby Bob Hayes; Kathleen Kotwica; Dean Correia

    Elsevier Science 2013; US$ 49.95

    The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization?s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after... more...

  • The Benefits and Security Risks of Web-Based Applications for Businessby Kathleen Kotwica

    Elsevier Science 2013; US$ 24.95

    This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration,... more...

  • The Basics of Web Hackingby Josh Pauli

    Elsevier Science 2013; US$ 29.95

    The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers.... more...

  • Take Control of Your Online Privacyby Joe Kissell

    TidBITS 2014; US$ 10.00

    Learn what's private online (not much)--and what to do about it! Updated March 19, 2014 Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you... more...

  • Dragnet Nationby Julia Angwin

    Henry Holt and Co. 2014; US$ 28.99

    An inside look at who?s watching you, what they know and why it matters. We are being watched. We see online ads from websites we?ve visited, long after we?ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what?s in the neighborhood but also enabling others to track us. And the federal government,... more...

  • Hackers and Hacking: A Reference Handbookby Thomas Holt; Bernadette Schell

    ABC-CLIO 2013; US$ 58.00

    This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. more...

  • Learning Devise for Railsby Giovanni Sakti

    Packt Publishing 2013; US$ 17.99

    A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...