The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Elsevier Science 2013; US$ 59.95
Risk Management Framework explains the application of the Risk Management Framework (RMF) to both the experienced and novice reader. James Broad presents the process by implementing the steps on a fictitious organization from initiation to decommission and disposal. The Risk Management Framework allows an organization to develop an organization-wide... more...
- CRC Press 2013; US$ 119.95
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem... more...
- CRC Press 2013; US$ 79.95
The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and governance, it illustrates the entire process of adapting... more...
- Wiley 2013; US$ 24.99
An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with... more...
- Auerbach Publications 2005; US$ 79.95
The Chief Security Officer helps readers understand the emerging phenomenon of a position that combines the traditional security manager with one who protects information. It explains why a chief security officer is important and how security needs to be implemented in terms of identifying risk, developing a corporate policy, and implementing unified... more...
- Pearson Education 2004; US$ 23.99
Put your Security+ knowledge to the test. The Security+ Certification Exam Cram 2 Lab Manual gives you optimal time with hands-on exercises designed to complement and reinfocrce material you have read in the corresponding Exam Cram 2 book or learned in a classroom setting. You will perform tasks you have learned about in other references and that... more...
- Wiley 2005; US$ 29.99
Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like... more...
- Pearson Education 2006; US$ 44.00
This is the eBook version of the printed book. The essential guide to understanding and using firewalls to protect personal computers and your network An easy-to-read introduction to the most commonly deployed network security device Understand the threats firewalls are designed to protect against Learn basic firewall architectures,... more...
- Pearson Education 2006; US$ 49.99
This is the eBook version of the printed book. An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls... more...
- Elsevier Science 2005; US$ 81.95
BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...