The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Microsoft Press 2012; US$ 23.99
Assess your readiness for the CISSP Exam?and quickly identify where you need to focus and practice. This practical, streamlined guide provides objective overviews, exam tips, "need-to-know" checklists, review questions, and a list of valuable resources?all designed to help evaluate and reinforce your preparation. Bolster your exam prep with a... more...
- McGraw-Hill Education 2013; US$ 40.00
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is... more...
- Elsevier Science 2013; US$ 49.95
The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization?s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after... more...
- Elsevier Science 2013; US$ 24.95
This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration,... more...
- Elsevier Science 2013; US$ 29.95
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers.... more...
- TidBITS 2014; US$ 10.00
Learn what's private online (not much)--and what to do about it! Updated March 19, 2014 Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you... more...
- Henry Holt and Co. 2014; US$ 28.99
An inside look at who?s watching you, what they know and why it matters. We are being watched. We see online ads from websites we?ve visited, long after we?ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what?s in the neighborhood but also enabling others to track us. And the federal government,... more...
- ABC-CLIO 2013; US$ 58.00
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. more...
- Packt Publishing 2013; US$ 17.99
A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...
- New Press, The 2014;
We think we know everything about our smartphones. We use them constantly. We depend on them for every conceivable purpose. We are familiar with every inch of their compact frames. But there is more to the smartphone than meets the eye. How have smartphones shaped the way we socialize and interact? Who tracks our actions, our preferences, our movements... more...