The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • CEH Certified Ethical Hacker Practice Exams, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 30.00

    Don't Let the Real Test Be Your First Test! Fully updated for the CEH v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

  • Hackers and Hacking: A Reference Handbookby Thomas Holt; Bernadette Schell

    ABC-CLIO 2013; US$ 58.00

    What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of... more...

  • Learning Devise for Railsby Giovanni Sakti

    Packt Publishing 2013; US$ 17.99

    A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...

  • Privacy in the Age of Big Databy Theresa Payton; Ted Claypoole; Hon. Howard A. Schmidt

    Rowman & Littlefield Publishers 2014; US$ 19.99

    Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...

  • Java-Web-Securityby Dominik Schadow

    dpunkt.verlag 2014; US$ 24.80

    Java hat den Ruf, eine relativ sichere Programmiersprache zu sein. Verschiedene Spracheigenschaften und Java-interne Sicherheitsmechanismen unterstützen den Entwickler beim Erstellen sicherer Anwendungen. Sie helfen aber nicht, wenn bei der Programmierung ungewollt Schwachstellen eingebaut werden, über die Übeltäter erfolgreiche Angriffe durchführen... more...

  • CEH Certified Ethical Hacker Bundle, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 70.00

    Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two eBooks, electronic content, and a bonus quick review guide. CEH Certified Ethical Hacker All-in-One Exam Guide , Second Edition Complete coverage of all CEH exam objectives Ideal as both a study tool and an on-the-job resource Electronic... more...

  • Online Safetyby Justin Healey

    The Spinney Press 2015; US$ 30.00

    Presents a range of cyber-safety tips on avoiding risks online and how to stay protected. A chapter in the book is dedicated to dealing with cyberbullying. Also includes: worksheets and activities, fast facts, glossary, web links, index. more...

  • Build Your Own ASP.NET 4 Web Site Using C# & VB, 4th Editionby Timmothy Posey; Wyatt Barnett; Cristian Darie

    SitePoint 2011; US$ 29.00

    Build Your Own ASP.NET 4 Web Site Using C# & VB is aimed at beginner ASP.NET developers wanting to develop their skills, web designers wanting to move into server-side programming, and experienced developers making the leap from ASP to .NET. Readers will learn: language and programming basics how to construct ASP.Net Web Pages how to build... more...

  • Take Control of Your Online Privacyby Joe Kissell

    TidBITS 2015; US$ 15.00

    Learn what's private online (not much)--and what to do about it! Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you likely want to buy. In the... more...

  • iX kompakt 4/2013 - IPv6-Leitfadenby iX-Redaktion

    Heise Zeitschriften Verlag 2013; US$ 8.58

    Nichts geht im Internet ohne IP-Adresse. Seit der herkömmliche IPv4-Adressvorrat erschöpft ist, kommt allmählich Schwung in die Umsetzung der Nachfolgeversion IPv6. Obwohl das neue Internetprotokoll mehr zu bieten hat als einen praktisch unbegrenzten Adressraum, besteht immer noch ein großer Nachholbedarf bei Anwendern und Anbietern. Das Sonderheft... more...