The Leading eBooks Store Online

4,034,055 members ⚫ 1,328,001 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Viruses

Most popular at the top

  • Reverse Deception: Organized Cyber Threat Counter-Exploitationby Sean M. Bodmer; Dr. Max Kilger; Gregory Carpenter; Jade Jones

    McGraw-Hill Education 2012; US$ 42.00

    In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."-- Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. ... more...

  • Crafting the InfoSec Playbookby Jeff Bollinger; Brandon Enright; Matthew Valites

    O'Reilly Media 2015; US$ 42.99

    Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence... more...

  • Dark Territoryby Fred Kaplan

    Simon & Schuster 2016; US$ 12.99

    “An important, disturbing, and gripping history” ( Kirkus Reviews , starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the... more...

  • Windows Malware Analysis Essentialsby Victor Marak

    Packt Publishing 2015; US$ 39.99

    Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill setAbout This Book• Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware• Understand how to decipher x86 assembly code from source code inside your favourite... more...

  • CEH Certified Ethical Hacker All-in-One Exam Guide, Third Editionby Matt Walker

    McGraw-Hill Education 2016; US$ 50.00

    Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH... more...

  • Mobile Forensics – Advanced Investigative Strategiesby Oleg Afonin; Vladimir Katalov

    Packt Publishing 2016; US$ 39.99

    Master powerful strategies to acquire and analyze evidence from real-life scenarios About This Book: A straightforward guide to address the roadblocks face when doing mobile forensics; Simplify mobile forensics using the right mix of methods, techniques, and tools; Get valuable advice to put you in the mindset of a forensic professional, regardless... more...

  • CEH Certified Ethical Hacker Practice Exams, Third Editionby Matt Walker

    McGraw-Hill Education 2016; US$ 40.00

    Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

  • CEH Certified Ethical Hacker Bundle, Third Editionby Matt Walker

    McGraw-Hill Education 2017; US$ 70.00

    Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam. CEH Certified Ethical Hacker All-in-One... more...

  • Fatal System Errorby Joseph Menn

    PublicAffairs 2010; US$ 20.00

    In 2004, a California computer whiz named Barrett Lyon uncovered the identity of a hacker running major assaults on business websites. Without fully grasping the repercussions, he set on an investigation that led him into the heart of the Russian mob. Cybercrime was evolving. No longer the domain of small-time thieves, it had been discovered by sophisticated... more...

  • Android Security Internalsby Nikolay Elenkov

    No Starch Press 2014; US$ 39.95

    There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals , top Android security expert Nikolay Elenkov takes us under the hood... more...