The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Packt Publishing 2014;
A complete guide with code snippets and real-world examples of tasks required during NSE development.Each chapter covers an important aspect of NSE and its related scan tasks. The book also includes full explanations of scripts to help you fully understand their functionality.The book takes a ground-up approach to introducing you to NSE development.... more...
- Lyons Press 2014; US$ 15.99
Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies from former cyberstalking victim, Alexis Moore. As the founder of Survivors in Action, Moore explains how to identify potential cyberattackers and how to recover from a cybercrime if you?ve been attacked. Her indispensable book... more...
- McGraw-Hill Education 2014; US$ 50.00
An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this... more...
- Elsevier Science 2014; US$ 39.95
In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security... more...
- Taylor and Francis 2014; US$ 16.95
Social Media is becoming an increasingly important?and controversial?investigative source for law enforcement. This project provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial... more...
- Greystone Books 2014; US$ 17.95
“Technology is rapidly moving into our bodies,? writes cyber expert Keenan, “and this book gives a chilling look ahead into where that road may lead us – on a one way trip to the total surrender of privacy and the commoditization of intimacy.? Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments,... more...
- O'Reilly Media 2014; US$ 21.99
"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings , an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposé explores the shadowy world of the people responsible for today?s junk-email epidemic.... more...
- New Press, The 2014; US$ 18.95
We think we know everything about our smartphones. We use them constantly. We depend on them for every conceivable purpose. We are familiar with every inch of their compact frames. But there is more to the smartphone than meets the eye. How have smartphones shaped the way we socialize and interact? Who tracks our actions, our preferences, our movements... more...
- Elsevier Science 2014; US$ 54.95
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization?s most important asset?its proprietary information?safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and... more...
- PublicAffairs 2014; US$ 27.99
The greatest threat to privacy today is not the NSA, but good-old American companies. Internet giants, leading retailers, and other firms are voraciously gathering data with little oversight from anyone. In Las Vegas, no company knows the value of data better than Caesars Entertainment. Many thousands of enthusiastic clients pour through the ever-open... more...