The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
System design; Periodicals

Most popular at the top

  • Network Security Bibleby Eric Cole; Ronald L. Krutz; James Conley

    Wiley 2005; US$ 39.99

    A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The... more...

  • Semiotics in Information Systems Engineeringby Kecheng Liu

    Cambridge University Press 2000; US$ 52.00

    This book, first published in 2000, covers applications of semiotics to computer system developments, aimed at professionals and academics. more...

  • Digital Content Annotation and Transcodingby Katashi Nagao

    Artech House 2003; US$ 103.00

    Today, as industry professionals are identifying and targeting distinct segments in broadcast and Web audiences, the challenge is to create digital content that can be tailored and personalized to reach these distinct and differing audience segments. Transcoding and annotation are the methods that more and more engineers in the industry are using to... more...

  • Role-Based Access Controlby David Ferraiolo; Richard Kuhn; Ramaswamy Chandramouli

    Artech House 2003; US$ 90.00

    Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer... more...

  • User's Guide tp Crytography and Standards by Alex Dent; Chris Mitchell

    Artech House 2004; US$ 116.00

    With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized... more...

  • Data and Applications Security by Bhavani M. Thuraisingham

    Springer 2001; US$ 244.00

    New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole... more...

  • Grid Computing for Electromagneticsby Luciano Tarricone; Alessandra Esposito

    Artech House 2004; US$ 150.00

    Today, more and more practitioners, researchers, and students are utilizing the power and efficiency of grid computing for their increasingly complex electromagnetics applications. This cutting-edge book offers you the practical and comprehensive guidance you need to use this new approach to supercomputing for your challenging projects. Supported with... more...

  • Privacy Protection and Computer Forensicsby Michael Caloyannides

    Artech House 2004; US$ 94.00

    This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...

  • Black Hat Physical Device Securityby Drew Miller

    Elsevier Science 2005; US$ 53.95

    Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans,... more...

  • Microsoft® Exchange Server 2003 Deployment and Migrationby Kieran McCorry

    Elsevier Science 2004; US$ 81.95

    Microsoft® Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. The book discusses the requisite infrastructure requirements of Windows 2000 and Windows 2003. Furthermore, this book covers, in detail, the tools and techniques that messaging... more...