The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Database security

Most popular at the top

  • Database and Applications Securityby Bhavani Thuraisingham

    Taylor and Francis 2005; US$ 104.95

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,... more...

  • Understanding DB2 9 Securityby Rebecca Bond; Kevin Yeung-Kuen See; Carmen Ka Man Wong; Yuk-Kuen Henry Chan

    Pearson Education 2006; US$ 39.99

    Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation... more...

  • How to Survive a Data Breachby Stewart Mitchell

    IT Governance Ltd 2009; US$ 18.50

    A data breach can be a crushing blow to customer and staff confidence in your organisation. It can also seriously damage your reputation and brand value, and the career prospects of the staff involved. This pocket guide provides a loose blueprint to ensure that you know what steps you must take to rectify the situation, which authorities you need... more...

  • The Oracle Hacker's Handbookby David Litchfield

    Wiley 2007; US$ 44.99

    David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it... more...

  • CryptoGraphicsby Debra Cook; Angelos Keromytis

    Springer-Verlag New York Inc 2006; US$ 169.00

    Explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. This work evaluates the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in GPUs. more...

  • Practical Oracle Securityby Josh Shaul; Aaron Ingram

    Elsevier Science 2011; US$ 51.95

    This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. The book?s companion Web site... more...

  • InfoSecurity 2008 Threat Analysisby Craig Schiller; Seth Fogie; Colby DeRodeff; Michael Gregg

    Elsevier Science 2011; US$ 62.95

    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities,... more...

  • Security, Privacy and Trust in Modern Data Managementby Milan Petkovic; Willem Jonker

    Springer 2007; US$ 169.00

    This volume presents recent methodological developments in data analysis and classification. A wide range of topics is covered that includes methods for classification and clustering, dissimilarity analysis, graph analysis, consensus methods, conceptual analysis of data, analysis of symbolic data, statistical multivariate methods, data mining and knowledge... more...

  • Modelling Cyber Securityby U. Gori

    IOS Press 2009; US$ 157.00

    Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security. more...

  • Privacy-Aware Knowledge Discoveryby Francesco Bonchi; Elena Ferrari

    Taylor and Francis 2010; US$ 104.95

    Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities... more...