The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Zero-Day Exploit:by Rob Shein; Marcus Sachs

    Elsevier Science 2004; US$ 51.95

    The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy... more...

  • Securing IM and P2P Applications for the Enterpriseby Marcus Sachs; Paul Piccard

    Elsevier Science 2005; US$ 51.95

    This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These... more...

  • Therapeutic Landscapesby Clare Cooper Marcus; Naomi A Sachs

    Wiley 2013; US$ 90.00

    This comprehensive and authoritative guide offers an evidence-based overview of healing gardens and therapeutic landscapes from planning to post-occupancy evaluation. It provides general guidelines for designers and other stakeholders in a variety of projects, as well as patient-specific guidelines covering twelve categories ranging from burn patients,... more...

  • Cyber Adversary Characterizationby Tom Parker; Marcus Sachs; Eric Shaw; Ed Stroz

    Elsevier Science 2004; US$ 51.95

    The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be... more...

  • Cyber Security Policy Guidebookby Jennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus H. Sachs; Jeffrey Schmidt; Joseph Weiss

    Wiley 2012; US$ 95.95

    Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale?taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes... more...

  • 1
  • Page