The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Incident Response & Computer Forensics, Third Editionby Jason Luttgens; Matthew Pepe; Kevin Mandia

    McGraw-Hill Education 2014; US$ 60.00

    Jason T. Luttgens is a former technical director of the security consulting firm Mandiant where he led dozens of global investigations involving industrial espionage, cardholder data theft, and other crimes. A veteran of the U.S. Air Force, he served in the Office of Special Investigations and at the Department of Defense?s Computer Forensics Laboratory.... more...

  • CEH Certified Ethical Hacker Bundle, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 70.00

    Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) has served in IT security roles at Hewlett-Packard, Lockheed Martin, and the Marshall Space Flight Center. He was the director of the Network Training Center and the curriculum lead and senior instructor for the local Cisco Networking Academy on Ramstein AB, Germany. more...

  • Computer Forensics InfoSec Pro Guideby David Cowen

    McGraw-Hill Education 2013; US$ 40.00

    David Cowen, CISSP, is a partner at G-C Partners, LLC, where he provides expert witness services and consulting to Fortune 500 companies worldwide. He is a coauthor of Anti-Hacker Tool Kit, Third Edition and two editions of Hacking Exposed Computer Forensics . more...

  • Advanced Persistent Threat Hackingby Tyler Wrightson

    McGraw-Hill Education 2014; US$ 50.00

    Tyler Wrightson , CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, which provides offensive security services such as penetration testing and red teaming. He is the author of Wireless Network Security: A Beginner?s Guide . Follow Tyler's security blog at http://blog.leetsys.com. more...

  • The Benefits and Security Risks of Web-Based Applications for Businessby Kathleen Kotwica

    Elsevier Science 2013; US$ 24.95

    This trend report provides security executives and practitioners with an overview of the benefits of using web-based applications and tools in the workplace and their security risks. Web-based applications are being used by businesses more and more each year for purposes of improved communication with employees and customers, group collaboration,... more...

  • Web Site Privacy with P3Pby Helena Lindskog; Stefan Lindskog

    Wiley 2003; US$ 40.00

    A cutting-edge, first look at how to embed and design a Web site compliant with the new personal privacy standard, P3P Introduces the P3P standard with detailed descriptions and then examines its parameters Includes helpful guidelines, explanations, and P3P how-to examples for system architects to follow Presents detailed case studies covering companies... more...

  • Multicast and Group Securityby Thomas Hardjono; Lakshminath Dondeti

    Artech House 2003; US$ 93.00

    A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication. more...

  • Intrusion Detection with Snortby Jack Koziol

    Pearson Education 2003; US$ 40.00

    With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide... more...

  • Configuring Check Point NGX VPN-1/Firewall-1by Barry J Stiefel; Simon Desmeules

    Elsevier Science 2005; US$ 51.95

    Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and... more...

  • Steal This Computer Book 4.0by Wallace Wang

    No Starch Press 2006; US$ 3.95

    This offbeat, nontechnical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P filesharing networks, and how people manipulate... more...