The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2014; US$ 50.00
Tyler Wrightson , CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, which provides offensive security services such as penetration testing and red teaming. He is the author of Wireless Network Security: A Beginner?s Guide . Follow Tyler's security blog at http://blog.leetsys.com. more...
- Elsevier Science 2013; US$ 24.95
This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration,... more...
- Elsevier Science 2013; US$ 29.95
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers.... more...
- dpunkt.verlag 2013; US$ 38.46
Dieses Buch behandelt alle Aspekte des funktionalen Sicherheitsmanagements und beschreibt die Anforderungen der ISO 26262 im Detail. Es wird nicht nur dargestellt, was in der Norm gefordert wird, sondern auch wie die Anforderungen erfüllt werden können. Dies geschieht anhand eines durchgängigen Praxisbeispiels aus dem Automotive-Bereich. Umfangreiche... more...
- TidBITS 2013; US$ 10.00
Learn what's private online (not much)--and what to do about it! Updated March 19, 2014 Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you... more...
- McGraw-Hill Education 2014; US$ 30.00
Matt Walker, CEH, CPTS , is an IT security architect working for Hewlett-Packard. He has held a variety of networking and IT security positions, including most recently the IT security manager position at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract). more...
- Henry Holt and Co. 2014; US$ 16.99
An inside look at who's watching you, what they know and why it matters. We are being watched. We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government,... more...
- Packt Publishing 2013; US$ 17.99
A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...
- ABC-CLIO 2013; US$ 58.00
? Documents how computer hacking fits into various forms of cybercrime ? Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking ? Clarifies the subtle differences between ethical and malicious hacks ? Focuses on the non-technical aspects of computer hacking to enable the... more...
- Rowman & Littlefield Publishers 2014; US$ 17.99
Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...