The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Information Governance and Securityby John G. Iannarelli; Michael O?Shaughnessy

    Elsevier Science 2014; US$ 54.95

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization?s most important asset?its proprietary information?safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and... more...

  • Technocreepby Thomas P. Keenan

    Greystone Books 2014; US$ 17.95

    “Technology is rapidly moving into our bodies,? writes cyber expert Keenan, “and this book gives a chilling look ahead into where that road may lead us – on a one way trip to the total surrender of privacy and the commoditization of intimacy.? Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments,... more...

  • Spam Kingsby Brian S McWilliams

    O'Reilly Media 2014; US$ 21.99

    "People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings , an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposé explores the shadowy world of the people responsible for today?s junk-email epidemic.... more...

  • The Smartphoneby Elizabeth Woyke

    New Press, The 2014; US$ 18.95

    We think we know everything about our smartphones. We use them constantly. We depend on them for every conceivable purpose. We are familiar with every inch of their compact frames. But there is more to the smartphone than meets the eye. How have smartphones shaped the way we socialize and interact? Who tracks our actions, our preferences, our movements... more...

  • What Stays in Vegasby Adam Tanner

    PublicAffairs 2014; US$ 27.99

    The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open... more...

  • Testing and Securing Android Studio Applicationsby Belén Cruz Zapata; Antonio Hernández Niñirola

    Packt Publishing 2014; US$ 20.99

    If you are a developer with some Android knowledge, but you do not know how to test your applications using Android Studio, this book will guide you. It is recommended that you are familiar with Android Studio IDE. more...

  • Online Security for the Business Travelerby Deborah Gonzalez

    Elsevier Science 2014; US$ 16.95

    Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today?s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency,... more...

  • Take Control of FileVaultby Joe Kissell

    TidBITS 2014; US$ 10.00

    Protect your Mac's data in the event of theft with Apple's FileVault! If your Mac were stolen, would you worry about the thief seeing your email, photos, financial data, and other sensitive information? OS X's built-in FileVault encryption technology ensures that your Mac's contents are safe from prying eyes, but if you're hesitant to entrust... more...

  • Incident Response & Computer Forensics, Third Editionby Jason Luttgens; Matthew Pepe; Kevin Mandia

    McGraw-Hill Education 2014; US$ 60.00

    The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics , Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource... more...

  • Social Engineering in IT Security: Tools, Tactics, and Techniquesby Sharon Conheady

    McGraw-Hill Education 2014; US$ 40.00

    Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."-- Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security... more...