The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Dragnet Nationby Julia Angwin

    Henry Holt and Co. 2014; US$ 16.99

    1. Hacked 1 2. A Short History of Tracking 21 3. State of Surveillance 37 4. Freedom of Association 51 5. Threat Models 65 6. The Audit 80 7. The First Line of Defense 96 8. Leaving Google 112 9. Introducing Ida 127 10. Pocket Litter 140 11. Opting Out 153 12. The Hall of Mirrors 167 13.... more...

  • Learning Devise for Railsby Giovanni Sakti

    Packt Publishing 2013; US$ 17.99

    A hands-on, step-by-step guide to using Devise for authentication in Rails.If you are a web developer who is getting started with Rails and you are looking for authentication solutions, then this is the book for you. If you are a current Rails developer who is looking to extend your authentication implementation with capabilities such as authorization... more...

  • Privacy in the Age of Big Databy Theresa Payton; Ted Claypoole; Hon. Howard A. Schmidt

    Rowman & Littlefield Publishers 2014; US$ 17.99

    Digital data collection and surveillance is pervasive and no one can protect your privacy without your help. Before you can help yourself, you need to understand the new technologies, what benefits they provide, and what trade-offs they require. Some of those trade-offs ? privacy for convenience ? could be softened by our own behavior or be reduced... more...

  • Java-Web-Securityby Dominik Schadow

    dpunkt.verlag 2014; US$ 23.15

    Java hat den Ruf, eine relativ sichere Programmiersprache zu sein. Verschiedene Spracheigenschaften und Java-interne Sicherheitsmechanismen unterstützen den Entwickler beim Erstellen sicherer Anwendungen. Sie helfen aber nicht, wenn bei der Programmierung ungewollt Schwachstellen eingebaut werden, über die Übeltäter erfolgreiche Angriffe durchführen... more...

  • CEH Certified Ethical Hacker Bundle, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 70.00

    Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) has served in IT security roles at Hewlett-Packard, Lockheed Martin, and the Marshall Space Flight Center. He was the director of the Network Training Center and the curriculum lead and senior instructor for the local Cisco Networking Academy on Ramstein AB, Germany. more...

  • Online Safetyby Justin Healey

    The Spinney Press 2015; US$ 30.00

    Presents a range of cyber-safety tips on avoiding risks online and how to stay protected. A chapter in the book is dedicated to dealing with cyberbullying. Also includes: worksheets and activities, fast facts, glossary, web links, index. more...

  • Build Your Own ASP.NET 4 Web Site Using C# & VB, 4th Editionby Timmothy Posey; Wyatt Barnett; Cristian Darie

    SitePoint 2011; US$ 29.00

    Build Your Own ASP.NET 4 Web Site Using C# & VB is aimed at beginner ASP.NET developers wanting to develop their skills, web designers wanting to move into server-side programming, and experienced developers making the leap from ASP to .NET. Readers will learn: language and programming basics how to construct ASP.Net Web Pages how to build... more...

  • Hackers and Hackingby Thomas Holt; Bernadette Schell

    ABC-CLIO 2013; US$ 58.00

    ? Documents how computer hacking fits into various forms of cybercrime ? Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking ? Clarifies the subtle differences between ethical and malicious hacks ? Focuses on the non-technical aspects of computer hacking to enable the... more...

  • Web Site Privacy with P3Pby Helena Lindskog; Stefan Lindskog

    Wiley 2003; US$ 40.00

    A cutting-edge, first look at how to embed and design a Web site compliant with the new personal privacy standard, P3P Introduces the P3P standard with detailed descriptions and then examines its parameters Includes helpful guidelines, explanations, and P3P how-to examples for system architects to follow Presents detailed case studies covering companies... more...

  • Hack Attacks Testingby John Chirillo

    Wiley 2003; US$ 50.00

    JOHN CHIRILLO is Senior Inter-networking Engineer at ValCom, a technology management company in the Midwest. John holds numerous certifications including CCNA, CCDA, CCNP, CISSP, Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience on various computer... more...