The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Database security

  • CryptoGraphicsby Debra Cook; Angelos D. Keromytis

    Springer US 2006; US$ 169.00

    Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential... more...

  • Data and Applications Security by Bhavani M. Thuraisingham

    Springer 2001; US$ 244.00

    New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole... more...

  • Data and Applications Security XVIIby Sabrina de Capitani di Vimercati; Indrakshi Ray; Indrajit Ray

    Springer 2004; US$ 175.00

    Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. more...

  • Database and Applications Securityby Bhavani Thuraisingham

    CRC Press 2005; US$ 109.95

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,... more...

  • Enhancing Information Security and Privacy by Combining Biometrics with Cryptographyby Sanjay Kanade; Dijana Petrovska-Delacretaz; Bernadette Dorizzi

    Morgan & Claypool Publishers 2012; US$ 40.00

    This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity.... more...

  • Enterprise Architecture and Information Assuranceby James A. Scholz

    CRC Press 2013; US$ 79.95

    Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure... more...

  • Handbook of Database Securityby Michael Gertz; Sushil Jajodia

    Springer US 2007; US$ 229.00

    Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional... more...

  • How to Survive a Data Breachby Stewart Mitchell

    IT Governance Ltd 2009; US$ 29.90

    A data breach can be a crushing blow to customer and staff confidence in your organisation. It can also seriously damage your reputation and brand value, and the career prospects of the staff involved. This pocket guide provides a loose blueprint to ensure that you know what steps you must take to rectify the situation, which authorities you need... more...

  • InfoSecurity 2008 Threat Analysisby Craig Schiller; Seth Fogie; Colby DeRodeff; Michael Gregg

    Elsevier Science 2011; US$ 62.95

    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities,... more...

  • Managing Catastrophic Loss of Sensitive Databy Constantine Photopoulos

    Elsevier Science 2011; US$ 62.95

    Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very... more...