The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Social Engineering in IT Security: Tools, Tactics, and Techniquesby Sharon Conheady

    McGraw-Hill Education 2014; US$ 40.00

    Cutting-edge social engineering testing techniques Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance,... more...

  • CEH Certified Ethical Hacker Practice Exams, Second Editionby Matt Walker

    McGraw-Hill Education 2014; US$ 30.00

    Don't Let the Real Test Be Your First Test! Fully updated for the CEH v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

  • Safeguarding Intangible Assetsby Michael D. Moberly

    Elsevier Science 2014; US$ 49.95

    Safeguarding Intangible Assets provides strategies for preserving and enhancing a company?s intangible assets to increase its profitability, competitiveness, and sustainability. Intangible assets such as patents, trademarks, copyrights, methodologies, and brand typically account for 80 percent of an organization?s value and revenue. There are... more...

  • Hackers Wantedby Martin C. Libicki; David Senty; Julia Pollak

    RAND Corporation 2014; US$ 9.95

    The perceived shortage of cybersecurity professionals working on national security may endanger the nation?s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession... more...

  • Python Forensicsby Chet Hosmer

    Elsevier Science 2014; US$ 69.95

    Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions.... more...

  • No Place to Hideby Glenn Greenwald

    Henry Holt and Co. 2014; US$ 27.99

    In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor Edward Snowden, and his revelations about the agency?s widespread,... more...

  • Computer Forensics and Digital Investigation with EnCase Forensic v7by Suzanne Widup

    McGraw-Hill Education 2014; US$ 50.00

    Conduct repeatable, defensible investigations with EnCase Forensic v7 Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted... more...

  • AARP Protecting Yourself Online For Dummiesby Nancy C. Muir; Ryan C. Williams

    Wiley 2014; US$ 3.99

    Protect your privacy and use the internet safely! Don’t let news about internet risks deter you from taking full advantage of its benefits! The web is such an amazing and useful resource for connecting with friends and family, shopping, banking, catching up on current events, and getting help in a myriad of ways. Let AARP’s Protecting... more...

  • Manga Studio 5 Beginner?s Guideby Richard Rhodes

    Packt Publishing 2014; US$ 23.99

    Using a step-by-step approach, this book will lead you through the process of building up complex, multi-page comic/Manga art, along with industry insights along the way. "Manga Studio Beginner's Guide" is for beginners in comic creation. The more you know about how comics are made, the better you will be, but it's not essential to get the most out... more...

  • The NSA Reportby The President's Review Group on Intelligence and Communications Technologies; Richard A. Clarke; Michael J. Morell; Geoffrey R. Stone; Cass R. Sunstein; Peter Swire

    Princeton University Press 2014; US$ 9.95

    "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."-- The NSA Report... more...