The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Anonym im Internet mit Tor und Tailsby Peter Loshin

    Franzis Verlag 2015; Not Available

    Möchten Sie, dass jeder Ihre E-Mails mitliest, und haben Sie ein gutes Gefühl, wenn Ihnen am Bildschirm ständig jemand über die Schulter blickt - haben Sie nichts zu verbergen? Dann können Sie doch auch direkt Ihre Passwörter für E-Mail und Bankkonto veröffentlichen. Ach, soweit wollen Sie dann doch nicht gehen? Nach den ganzen Enthüllungen durch Edward... more...

  • Abusing the Internet of Thingsby Nitesh Dhanjani

    O'Reilly Media 2015; US$ 31.99

    A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you?re part of a team creating applications for Internet-connected... more...

  • Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401)by Mike Meyers

    McGraw-Hill Education 2015; US$ 60.00

    An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike Meyers In Mike Meyers? CompTIA Security+ Certification Guide (Exam SY0-401) , the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time. Like the exam, this book goes... more...

  • Hacking Handbuchby Dr. Patrick Engebretson

    Franzis Verlag 2015; US$ 27.92

    Täglich liest man von neuen Sicherheitslücken und Hackern, die diese Lücken ausnutzen - sobald man selbst betroffen ist, weiß man, wie sich Datenklau und ein nicht funktionierendes IT-System anfühlen. Was kann man dagegen tun? Vorsorgen und Sicherheitslücken schließen. Dafür müssen Sie die Techniken und Werkzeuge der Hacker kennen und am besten selbst... more...

  • The Identity Theft Protection Guideby Ph.D. Amanda Welsh

    St. Martin's Press 2015; US$ 22.99

    PROTECTION PREVENTION REPAIR Identity theft is the fastest-growing category of crime in the United States today, and dealing with privacy and identity issues has become an essential part of life in our modern society. Each chapter in The Identity Theft Protection Guide contains a self-quiz to identify personal areas of concern, information to help... more...

  • Accumuloby Aaron Cordova; Billie Rinaldi; Michael Wall

    O'Reilly Media 2015; US$ 42.99

    Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google?s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.... more...

  • Microsoft Dynamics AX 2012 R3 Securityby Ahmed Mohamed Rafik Moustafa

    Packt Publishing 2015; US$ 35.99

    If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX. more...

  • Law, Privacy and Surveillance in Canada in the Post-Snowden Eraby Michael Geist

    University of Ottawa Press 2015; US$ 44.99

    Years of surveillance-related leaks from US whistleblower Edward Snowden have fuelled an international debate on privacy, spying, and Internet surveillance. Much of the focus has centered on the role of the US National Security Agency, yet there is an important Canadian side to the story. The Communications Security Establishment, the Canadian counterpart... more...

  • Take Control of Your Online Privacyby Joe Kissell

    TidBITS 2015; US$ 15.00

    Learn what's private online (not much)--and what to do about it! Do you have anything to hide? Whether or not you think you do, your online activities are certainly tracked -- and not just by well-meaning sites who want to keep you logged in or by marketing firms who want to show you targeted ads for products that you likely want to buy. In the... more...

  • Take Control of Security for Mac Usersby Joe Kissell

    TidBITS 2015; US$ 15.00

    Prevent -- or recover from -- illicit access to your Mac and its data. Do credit card fraud, hacking, identity theft, and online shopping and banking risks concern you? How about the dangers of malware, phishing, and Wi-Fi sniffing when you use your Mac? You are not alone -- these dangers top the lists of security concerns in many surveys. But... more...