The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Taylor and Francis 2014; US$ 79.95
Since databases are the primary repositories of information for today?s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database?illustrating... more...
- Wiley 2003; US$ 50.00
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable... more...
- Taylor and Francis 2005; US$ 104.95
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,... more...
- Pearson Education 2006; US$ 39.99
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation... more...
- IT Governance Ltd 2009; US$ 18.50
A data breach can be a crushing blow to customer and staff confidence in your organisation. It can also seriously damage your reputation and brand value, and the career prospects of the staff involved. This pocket guide provides a loose blueprint to ensure that you know what steps you must take to rectify the situation, which authorities you need... more...
- Springer-Verlag New York Inc 2006; US$ 169.00
Explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. This work evaluates the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in GPUs. more...
- Springer 2006; US$ 34.99
he book is an invaluable guide and tutorial to using the different types of assemblies in SQL Server 2005. Examples are plentiful and well chosen to represent common business solutions. — Will Wagers, C# Online.NET "Pro SQL Server 2005 Assemblies" provides a detailed and example-driven tutorial on how to build and use .NET assemblies.... more...
- Springer 2007; US$ 229.00
Provides an overview of data security models, techniques, and architectures for a variety of data management applications and settings. This book emphasizes aspects of data centric security that reach beyond traditional and known approaches. It covers SQL standards and security in commercial and open-source database management systems. more...
- Springer 2007; US$ 169.00
This volume presents recent methodological developments in data analysis and classification. A wide range of topics is covered that includes methods for classification and clustering, dissimilarity analysis, graph analysis, consensus methods, conceptual analysis of data, analysis of symbolic data, statistical multivariate methods, data mining and knowledge... more...
- IOS Press 2009; US$ 157.00
Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security. more...