The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Springer Fachmedien Wiesbaden 2013; US$ 89.99
This book presents the most interesting talks given at ISSE 2013 ? the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management ... more...
- Springer International Publishing 2013; US$ 259.00
Information communication technologies have become the necessity in everyday life enabling increased level of communication, processing and information exchange to extent that one could not imagine only a decade ago. Innovations in these technologies open new fields in areas such as: language processing, biology, medicine, robotics, security, urban... more...
- Springer London 2014; US$ 129.00
Cloud computing is no-longer a novel paradigm, but instead an increasingly robust and established technology, yet new developments continue to emerge in this area. Continued Rise of the Cloud: Advances and Trends in Cloud Computing captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models.... more...
- Springer Berlin Heidelberg 2014; US$ 229.00
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting?edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be... more...
- Springer Japan 2014; US$ 129.00
This book deals with one of the most novel advances in mathematical modeling for applied scientific technology, including computer graphics, public-key encryption, data visualization, statistical data analysis, symbolic calculation, encryption, error correcting codes, and risk management. It also shows that mathematics can be used to solve problems... more...
- Springer US 2008; US$ 259.00
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical... more...
- Springer India 2011; US$ 159.00
DoS attacks are now so pervasive that virtually any computer connected to a network is vulnerable. This book offers insights into the complexity of the problem as well as the breadth of the research being conducted into the various aspects of the issue. more...
- Springer Netherlands 2011; US$ 159.00
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information... more...
- Springer Berlin Heidelberg 2012; US$ 149.00
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments. more...