The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Springer-Verlag New York Inc 2006; US$ 169.00
Explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. This work evaluates the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in GPUs. more...
- Morgan & Claypool Publishers 2012; US$ 40.00
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity.... more...
- CRC Press 2013; US$ 79.95
Setting the Foundation Building the Enterprise Infrastructure Security Categorization Applied to Information Types Security Categorization Applied to Information Systems Minimum Security Requirements Specifications for Minimum Security Requirements Security Control Selection Infrastructure Security Model Components Developing the Security... more...
- Springer US 2007; US$ 229.00
This handbook provides an up-to-date overview of data security models, techniques, and architectures for a variety of data management applications and settings. In addition, the book outlines future research directions for the field. Edited by world renowned leaders in data security, the handbook emphasizes aspects of data centric security that reach... more...
- IT Governance Ltd 2009; US$ 18.50
A data breach can be a crushing blow to customer and staff confidence in your organisation. It can also seriously damage your reputation and brand value, and the career prospects of the staff involved. This pocket guide provides a loose blueprint to ensure that you know what steps you must take to rectify the situation, which authorities you need... more...
- Elsevier Science 2011; US$ 62.95
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities,... more...
- Elsevier Science 2011; US$ 62.95
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very... more...
- Elsevier Science 2014; US$ 49.95
Modeling Enterprise Architecture with TOGAF explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes... more...
- IOS Press 2009; US$ 157.00
Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security. more...
- CRC Press 2014; US$ 79.95
Concepts of Database Security Database Concepts Relational Database Security Concepts Access Control in Relational Databases Discretionary Access Control Mandatory Access Control Role-Based Access Control Work Objectives Book Organization Basic Concept of Multilevel Database Security Introduction Multilevel Database... more...