The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)Springer 2013; US$ 399.00
The proceeding is a collection of research papers presented at the International Conference on Data Engineering 2013 (DaEng-2013), a conference dedicated to address the challenges in the areas of database, information retrieval, data mining and knowledge management, thereby presenting a consolidated view to the interested researchers in the aforesaid... more...
- CRC Press 2015; US$ 79.95
Since databases are the primary repositories of information for today?s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database?illustrating... more...
- Morgan & Claypool Publishers 2010; US$ 35.00
Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that... more...
- Morgan & Claypool Publishers 2012; US$ 40.00
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions... more...
- Morgan & Claypool Publishers 2012; US$ 40.00
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity.... more...
- Apress 2006; US$ 34.99
The book provides an in-depth tutorial on building and using assemblies. It will focus on building assemblies in C# code, but will provide the equivalent VB.NET code in the code download. Alongside this tutorial comes a detailed examination of exactly when assemblies should and should not be used. Assemblies are not a complete replacement for T-SQL... more...
- Elsevier Science 2011; US$ 62.95
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very... more...
- Springer 2006; US$ 169.00
Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides an overview of approaches, techniques and open problems in privacy preserving data mining. It is for industry practitioners and policy makers. more...
- Elsevier Science 2014; US$ 49.95
Modeling Enterprise Architecture with TOGAF explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes... more...
- CRC Press 2013; US$ 79.95
Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure... more...