The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Elsevier Science 2015; US$ 120.00
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital... more...
- Packt Publishing 2015; US$ 26.99
If you want to learn to write your own scripts for the Nmap Scripting Engine, this is the book for you. It is perfect for network administrators, information security professionals, and even Internet enthusiasts who are familiar with Nmap. more...
- The Spinney Press 2015; US$ 30.00
Presents a range of cyber-safety tips on avoiding risks online and how to stay protected. A chapter in the book is dedicated to dealing with cyberbullying. Also includes: worksheets and activities, fast facts, glossary, web links, index. more...
- Open Road Distribution 2015; US$ 9.99
David Burnham is one of America?s foremost investigative reporters. In more than 18 years with The New York Times he uncovered abuses, corruption and wrongdoing at powerful government agencies including the Internal Revenue Service, the Nuclear Regulatory Commission, the FBI and the New York Police Department. His reporting work with Frank Serpico... more...
- TidBITS 2015; US$ 10.00
Updated January 13, 2015 Protect your Mac's data in the event of theft with Apple's FileVault! If your Mac were stolen, would you worry about the thief seeing your email, photos, financial data, and other sensitive information? OS X?s built-in FileVault encryption technology ensures that your Mac?s contents are safe from prying eyes, but if you?re... more...
- Packt Publishing 2014; US$ 26.99
If you are an expert Perl programmer interested in penetration testing or information security, this guide is designed for you. However, it will also be helpful for you even if you have little or no Linux shell experience. more...
- No Starch Press 2014; US$ 27.95
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), youll explore the darker side of Pythons capabilitieswriting network sniffers,... more...
- McGraw-Hill Education 2014; US$ 50.00
Tyler Wrightson , CISSP, CCSP, CCNA, CCDA, MCSE, is the founder and president of Leet Systems, which provides offensive security services such as penetration testing and red teaming. He is the author of Wireless Network Security: A Beginner?s Guide . Follow Tyler's security blog at http://blog.leetsys.com. more...
- No Starch Press 2014; US$ 23.95
The Ruby programming language is perfect for beginners: easy to learn, powerful, and fun to use! But wouldn't it be more fun if you were learning with the help of some wizards and dragons?Ruby Wizardry is a playful, illustrated tale that will teach you how to program in Ruby by taking you on a fantastical journey. As you follow the adventures of... more...
- McGraw-Hill Education 2014; US$ 60.00
Part I Security Concepts Chapter 1 General Security Concepts Chapter 2 Operational Organizational Security Chapter 3 Legal Issues, Privacy, and Ethics Part II Cryptography and Applications Chapter 4 Cryptography Chapter 5 Public Key Infrastructure Chapter 6 Standards and Protocols Part III Security in the Infrastructure Chapter 7 Physical... more...