The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Data Protection from Insider Threatsby Elisa Bertino

    Morgan & Claypool Publishers 2012; US$ 35.00

    As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools... more...

  • Collaborative Computingby Elisa Bertino; James B.D. Joshi

    Springer 2009; US$ 143.00

    This book constitutes the proceedings of the 4th conference CollaborateCom 2008 in Orlando, Florida and reflects the research results in collaborative computing networks, systems, and applications. The 18 invited papers and 41 full papers demonstate recent advances in many computing fields, including multi-core architectures, 3G/4G wireless networks,... more...

  • Identity Managementby Elisa Bertino; Kenji Takahashi

    Artech House 2011; US$ 99.00

    Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying... more...

  • Security for Web Services and Service-Oriented Architecturesby Elisa Bertino; Lorenzo Martino; Federica Paci; Anna Squicciarini

    Springer 2009; US$ 89.99

    This book will serve practitioners as a comprehensive critical reference on Web service standards, with illustrative examples and analyses of critical issues; researchers will use it as a state-of-the-art overview of ongoing research and innovative new directions; and graduate students will use it as a textbook on advanced topics in computer and system... more...

  • Trust Management IIIby Elena Ferrari; Ninghui Li; Elisa Bertino; Yucel Karabulut

    Springer 2009; US$ 199.00

    This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections... more...

  • Private Information Retrievalby Xun Yi; Russell Paulet; Elisa Bertino

    Morgan & Claypool Publishers 2013; US$ 40.00

    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can... more...

  • RFID Security and Privacyby Yingjiu Li; Robert Deng; Elisa Bertino

    Morgan & Claypool Publishers 2013; US$ 40.00

    As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the... more...

  • 1
  • Page