The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Google Apps Mastering Integration and Customization by Médéric Morel; Manuel Alves; Pascal Cadet

    Packt Publishing 2011; US$ 23.99

    Scale your applications and projects onto the cloud with Google Apps. more...

  • The Hacked World Orderby Adam Segal

    PublicAffairs 2016; US$ 26.99

    The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in... more...

  • Hackers and Hacking: A Reference Handbookby Thomas Holt; Bernadette Schell

    ABC-CLIO 2013; US$ 58.00

    What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of... more...

  • Hacking: The Next Generationby Nitesh Dhanjani; Billy Rios; Brett Hardin

    O'Reilly Media 2009; US$ 31.99

    With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books... more...

  • Hacking Exposed 7by Stuart McClure; Joel Scambray; George Kurtz

    McGraw-Hill Education 2012; US$ 50.00

    The latest tactics for thwarting digital attacks ?Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker?s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for... more...

  • Hacking Exposed Wireless, Second Editionby Johnny Cache; Joshua Wright; Vincent Liu

    McGraw-Hill Education 2010; US$ 55.00

    The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless , second edition reveals how attackers use readily available and custom tools... more...

  • IT Security Metrics: A Practical Framework for Measuring Security & Protecting Databy Lance Hayden

    McGraw-Hill Education 2010; US$ 53.00

    Implement an Effective Security Metrics Project or Program IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those... more...

  • Incident Response & Computer Forensics, Third Editionby Jason Luttgens; Matthew Pepe; Kevin Mandia

    McGraw-Hill Education 2014; US$ 60.00

    The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics , Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource... more...

  • Java-Web-Securityby Dominik Schadow

    dpunkt.verlag 2014; US$ 24.80

    Java hat den Ruf, eine relativ sichere Programmiersprache zu sein. Verschiedene Spracheigenschaften und Java-interne Sicherheitsmechanismen unterstützen den Entwickler beim Erstellen sicherer Anwendungen. Sie helfen aber nicht, wenn bei der Programmierung ungewollt Schwachstellen eingebaut werden, über die Übeltäter erfolgreiche Angriffe durchführen... more...

  • Learning Devise for Railsby Giovanni Sakti

    Packt Publishing 2013; US$ 17.99

    A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...