The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Computer Insecurityby Steven Furnell

    Springer 2007; US$ 89.99

    To be aware is to be secure. This book details many different IT security problems and their potential impact on the bottom line. Written specifically for business managers, it emphasizes issues over technology, describing the variety of possible vulnerabilities and likely consequences rather than complex concepts and technologies. more...

  • Mobile Securityby Steven Furnell

    IT Governance Publishing 2009; US$ 14.95

    The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems. more...

  • Selected Papers from the HAISA 2011 Symposiumby Steven Furnell

    Emerald Group Publishing Limited 2012; US$ 199.00

    This ebook presents selected papers which were presented at the HAISA 2011 conference on 7-8 July 2011 at Kingston University, London, United Kingdom more...

  • Selected papers from the fourth international network conference 2004 Plymouth UKby Dr Steven Furnell

    Emerald Group Publishing Limited 2004; US$ 199.00

    The papers in this issue of Campus-Wide Information Systems are based on a selection of those that were presented at INC 2004, the Fourth International Network Conference, which was held in Plymouth, UK, from 6-9 July 2004. INC events have been running since 1998, and provide a forum for sharing the latest research in computer networks and related... more...

  • Papers from the HAISA 2007 Symposiumby Steven Furnell; Nathan Clarke

    Emerald Group Publishing Limited 2007; US$ 199.00

    The first two papers in this e-book give a global perspective on Information Management issues. The remaining papers are security-focused, and have been selected for inclusion from the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007), which took place in Plymouth, UK, on 10 July 2007. The theme of the event... more...

  • E-mail Securityby Steven Furnell; Paul S. Dowland

    IT Governance Publishing 2010; US$ 14.95

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. more...

  • Securing Information and Communications Systemsby Javier Lopez; Steven Furnell; Sokratis Katsikas; Ahmed Patel

    Artech House 2008; US$ 119.00

    This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed... more...

  • 1
  • Page