The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Computer Forensics InfoSec Pro Guideby David Cowen

    McGraw-Hill Education 2013; US$ 40.00

    Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is... more...

  • Business Continuityby Bob Hayes; Kathleen Kotwica; Dean Correia

    Elsevier Science 2013; US$ 49.95

    The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization?s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after... more...

  • Mastering FreeBSD and OpenBSD Securityby Yanek Korff; Paco Hope; Bruce Potter

    O'Reilly Media 2005; US$ 39.99

    FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators... more...

  • The Benefits and Security Risks of Web-Based Applications for Businessby Kathleen Kotwica

    Elsevier Science 2013; US$ 24.95

    This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration,... more...

  • Funktionale Sicherheit nach ISO 26262by Vera Gebhardt; Gerhard M. Rieger; Jürgen Mottok; Christian Gießelbach

    dpunkt.verlag 2013; US$ 42.09

    Dieses Buch behandelt alle Aspekte des funktionalen Sicherheitsmanagements und beschreibt die Anforderungen der ISO 26262 im Detail. Es wird nicht nur dargestellt, was in der Norm gefordert wird, sondern auch wie die Anforderungen erfüllt werden können. Dies geschieht anhand eines durchgängigen Praxisbeispiels aus dem Automotive-Bereich. Umfangreiche... more...

  • Take Control of Your Online Privacyby Joe Kissell

    TidBITS 2014; US$ 10.00

    Learn what's private online (not much)--and what to do about it! Updated March 19, 2014 Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you... more...

  • Dragnet Nationby Julia Angwin

    Henry Holt and Co. 2014; US$ 28.99

    An inside look at who?s watching you, what they know and why it matters. We are being watched. We see online ads from websites we?ve visited, long after we?ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what?s in the neighborhood but also enabling others to track us. And the federal government,... more...

  • CEH Certified Ethical Hacker Practice Exams, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 30.00

    Don't Let the Real Test Be Your First Test! Fully updated for the CEH v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

  • Hackers and Hacking: A Reference Handbookby Thomas Holt; Bernadette Schell

    ABC-CLIO 2013; US$ 58.00

    This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. more...

  • Learning Devise for Railsby Giovanni Sakti

    Packt Publishing 2013; US$ 17.99

    A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...