The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Pearson Education 2005; US$ 32.00
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...
- Elsevier Science 2013; US$ 79.95
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background,... more...
- Packt Publishing 2012; US$ 35.99
Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. more...
- Taylor and Francis 2013; US$ 140.00
It is apparent that file sharing on the Internet has become an emerging norm of media consumption?especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, "piracy," and (not least) policy issues regarding these practices. Andersson Schwartz critically... more...
- Henry Holt and Co. 2014; US$ 16.99
An inside look at who's watching you, what they know and why it matters. We are being watched. We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government,... more...
- Sams Publishing 2006; US$ 39.99
Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses... more...
- Wiley 2004; US$ 17.59
Twenty-seven million Americans have been victims of identity theft in the last five years and the total cost of identity theft approaches $48 billion per year (total costs to businesses are $43 billion and the direct cost to consumers is $5 billion) These staggering statistics have prompted security consultant Michael Arata to provide readers... more...
- Wiley 2010; US$ 17.59
Practical solutions to help you deter, detect, and defend against identity theft In 2008, 9.9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spend some $5 billion out-of-pocket each year to clear up resulting fraud issues. This guide will help keep you from becoming the next victim. Written... more...
- Artech House 2003; US$ 90.00
This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to... more...