The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Firefox For Dummiesby Blake Ross

    Wiley 2011; US$ 21.59

    Firefox For Dummies gives you the inside scoop on the excitingnew browser from the Web wizard that got it started. The book'sauthor, Blake Ross, began developing Firefox as a teenager. Onceavailable to the world, the simple and powerful tool was an instanthit claiming a sizable share of the Web browser market with over140 million downloads. In this... more...

  • Funktionale Sicherheit nach ISO 26262by Vera Gebhardt; Gerhard M. Rieger; Jürgen Mottok; Christian Gießelbach

    dpunkt.verlag 2013; US$ 37.63

    Dieses Buch behandelt alle Aspekte des funktionalen Sicherheitsmanagements und beschreibt die Anforderungen der ISO 26262 im Detail. Es wird nicht nur dargestellt, was in der Norm gefordert wird, sondern auch wie die Anforderungen erfüllt werden können. Dies geschieht anhand eines durchgängigen Praxisbeispiels aus dem Automotive-Bereich. Umfangreiche... more...

  • Java-Web-Securityby Dominik Schadow

    dpunkt.verlag 2014; US$ 24.45

    Java hat den Ruf, eine relativ sichere Programmiersprache zu sein. Verschiedene Spracheigenschaften und Java-interne Sicherheitsmechanismen unterstützen den Entwickler beim Erstellen sicherer Anwendungen. Sie helfen aber nicht, wenn bei der Programmierung ungewollt Schwachstellen eingebaut werden, über die Übeltäter erfolgreiche Angriffe durchführen... more...

  • Privacy in the Age of Big Databy Theresa Payton; Ted Claypoole; Hon. Howard A. Schmidt

    Rowman & Littlefield Publishers 2014; US$ 17.99

    Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...

  • Mastering the Nmap Scripting Engineby Paulino Calderón Pale

    Packt Publishing 2015; US$ 26.99

    If you want to learn to write your own scripts for the Nmap Scripting Engine, this is the book for you. It is perfect for network administrators, information security professionals, and even Internet enthusiasts who are familiar with Nmap. more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities... more...

  • Web Site Privacy with P3Pby Helena Lindskog; Stefan Lindskog

    Wiley 2003; US$ 40.00

    A cutting-edge, first look at how to embed and design a Web site compliant with the new personal privacy standard, P3P Introduces the P3P standard with detailed descriptions and then examines its parameters Includes helpful guidelines, explanations, and P3P how-to examples for system architects to follow Presents detailed case studies covering companies... more...

  • Multicast and Group Securityby Thomas Hardjono; Lakshminath Dondeti

    Artech House 2003; US$ 93.00

    A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication. more...

  • Intrusion Detection with Snortby Jack Koziol

    Pearson Education 2003; US$ 40.00

    With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide... more...

  • Configuring Check Point NGX VPN-1/Firewall-1by Barry J Stiefel; Simon Desmeules

    Elsevier Science 2005; US$ 51.95

    Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and... more...