The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Pearson Education 2006; US$ 39.99
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM« DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation... more...
- Springer-Verlag New York Inc 2006; US$ 169.00
Explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. This work evaluates the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in GPUs. more...
- Springer 2006; US$ 34.99
he book is an invaluable guide and tutorial to using the different types of assemblies in SQL Server 2005. Examples are plentiful and well chosen to represent common business solutions. — Will Wagers, C# Online.NET "Pro SQL Server 2005 Assemblies" provides a detailed and example-driven tutorial on how to build and use .NET assemblies.... more...
- Taylor and Francis 2014; US$ 79.95
Since databases are the primary repositories of information for today?s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database?illustrating... more...
- Springer 2007; US$ 229.00
Provides an overview of data security models, techniques, and architectures for a variety of data management applications and settings. This book emphasizes aspects of data centric security that reach beyond traditional and known approaches. It covers SQL standards and security in commercial and open-source database management systems. more...
- IOS Press 2009; US$ 157.00
Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security. more...
Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)Springer 2013; US$ 399.00
The proceeding is a collection of research papers presentedá at the International Conference on Data Engineering 2013 (DaEng-2013), a conference dedicated to address the challenges in the areas of database, information retrieval, data mining and knowledge management, thereby presenting a consolidated view to the interested researchers in the aforesaid... more...
- Morgan & Claypool Publishers 2012; US$ 40.00
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity.... more...
- Wiley 2007; US$ 44.99
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it... more...