The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Pearson Education 2005; US$ 32.00
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...
- RAND Corporation 2014; US$ 9.95
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize... more...
- Elsevier Science 2013; US$ 79.95
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background,... more...
- Packt Publishing 2012; US$ 35.99
Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. more...
- Taylor and Francis 2013; US$ 125.00
This book provides a critical perspective on file sharing on the Internet, exploring issues related to file sharing, downloading, peer-to-peer networks, "piracy," and (not least) policy issues regarding these practices. more...
- Henry Holt and Co. 2014; US$ 28.99
An inside look at who?s watching you, what they know and why it matters. We are being watched. We see online ads from websites we?ve visited, long after we?ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what?s in the neighborhood but also enabling others to track us. And the federal government,... more...
- Sams Publishing 2006; US$ 39.99
Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...
- Artech House 2003; US$ 85.00
This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to... more...
- Artech House 2009; US$ 99.00
Heres a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security... more...