The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Intrusion Prevention Fundamentalsby Earl Carter; Jonathan Hogue

    Pearson Education 2006; US$ 51.99

    An introduction to network attack mitigation with IPS   Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the ?big picture?? What are the best practices related to IPS? How is IPS deployed, and... more...

  • IM Instant Messaging Securityby John CISM PhD Rittinghouse; James F. CISSP CISM PhD Ransome

    Elsevier Science 2005; US$ 84.95

    BRIEF DESCRIPTION OF CONTENT: There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security... more...

  • Cleaning Windows Vista For Dummiesby Allen Wyatt

    Wiley 2007; US$ 17.59

    Find out what you should clean, when, and how Dump programs you don't need, archive data, and bring order to your desktop Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning tools that help you organize your data and e-mail, archive... more...

  • Security Threat Mitigation and Responseby Dale Tesch; Greg Abelar

    Pearson Education 2006; US$ 50.00

    Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System   Dale Tesch Greg Abelar   While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...

  • SUSE LINUX Enterprise Server 9 Administrator's Handbookby Peter Kuo; Jacques Beland

    Pearson Education 2005; US$ 39.99

    As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through... more...

  • Privacy Enhancing Technologiesby Ian Goldberg; Mikhail J. Atallah

    Springer 2009; US$ 69.95

    This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009. The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of... more...

  • Data and Applications Security XXIIIby Ehud Gudes; Jaideep Vaidya

    Springer 2009; US$ 106.00

    This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security... more...

  • Handbook of Remote Biometricsby Massimo Tistarelli; Stan Z. Li; Rama Chellappa

    Springer 2009; US$ 189.00

    A comprehensive handbook that covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. It investigates issues of iris recognition, gait recognition, and touchless fingerprint recognition, as well as various aspects of face recognition. more...

  • Computational Color Imagingby Alain Tremeau; Raimondo Schettini; Shoji Tominaga

    Springer 2009; US$ 72.00

    This book constitutes the thoroughly refereed proceedings of the Second Computational Color Imaging Workshop, CCIW 2009, which was held in Saint-Etienne, France, in March 2009. The 23 revised full papers, presented together with one invited paper, were carefully reviewed and selected from 40 submissions. The papers, which contain a total of 114 colored... more...

  • Privacy in Location-Based Applicationsby Claudio Bettini; Sushil Jajodia; Pierangela Samarati; Sean X. Wang

    Springer 2009; US$ 72.00

    This book constitutes the refereed proceedings of the 8th International Conference on Electronic Government, EGOV 2009, held in Linz, Austria, in August/September 2008 within the DEXA 2009 conference cluster. The 34 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections... more...