The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

Most popular at the top

  • Cleaning Windows Vista For Dummiesby Allen Wyatt

    Wiley 2007; US$ 21.99

    Find out what you should clean, when, and how Dump programs you don't need, archive data, and bring order to your desktop Here's a handy household hint - getting control of all the clutter on your PC will make it run faster and more efficiently. This book is like a closet full of cleaning tools that help you organize your data and e-mail, archive... more...

  • Security Threat Mitigation and Responseby Dale Tesch; Greg Abelar

    Pearson Education 2006; US$ 50.00

    Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System   Dale Tesch Greg Abelar   While it is commonly understood that deploying network security devices is critical to the well-being of an organization?s systems and data, all too often companies assume that simply having these... more...

  • SUSE LINUX Enterprise Server 9 Administrator's Handbookby Peter Kuo; Jacques Beland

    Pearson Education 2005; US$ 39.99

    As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through... more...

  • Engineering Methods and Tools for Software Safety and Securityby M. Broy; W. Sitou; T. Hoare

    IOS Press 2009; US$ 174.00

    As a consequence of the wide distribution of software and software infrastructure, information security and safety depend on the quality and excellent understanding of its functioning. Only if this functionality is guaranteed as safe, customer and information are protected against adversarial attacks and malfunction. A vast proportion of information... more...

  • Privacy in Location-Based Applicationsby Claudio Bettini; Sushil Jajodia; Pierangela Samarati; Sean X. Wang

    Springer 2009; US$ 72.00

    This book constitutes the refereed proceedings of the 8th International Conference on Electronic Government, EGOV 2009, held in Linz, Austria, in August/September 2008 within the DEXA 2009 conference cluster. The 34 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections... more...

  • Privacy Enhancing Technologiesby Ian Goldberg; Mikhail J. Atallah

    Springer 2009; US$ 69.95

    This book constitutes the refereed proceedings of the 9th International Symposium on Privacy Enhancing Technologies, PETS 2009, held in Seattle, WA, USA, in August 2009. The 14 revised full papers presented were carefully reviewed and selected from 44 initial submissions. The papers - both from academia and industry - cover design and realization of... more...

  • Data and Applications Security XXIIIby Ehud Gudes; Jaideep Vaidya

    Springer 2009; US$ 106.00

    This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in Montreal, Canada, in July 2009. The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security... more...

  • Protecting Privacy in Video Surveillanceby Andrew Senior

    Springer 2009; US$ 89.99

    Discusses the topic of protecting privacy in video surveillance from various technical points of view and also examines surveillance from a societal perspective. This book features topics from MERL blind vision, stealth vision and privacy by de-identifying face images, to using mobile communications to assert privacy from video surveillance. more...

  • Handbook of Remote Biometricsby Massimo Tistarelli; Stan Z. Li; Rama Chellappa

    Springer 2009; US$ 189.00

    A comprehensive handbook that covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. It investigates issues of iris recognition, gait recognition, and touchless fingerprint recognition, as well as various aspects of face recognition. more...

  • Computational Color Imagingby Alain Tremeau; Raimondo Schettini; Shoji Tominaga

    Springer 2009; US$ 72.00

    This book constitutes the thoroughly refereed proceedings of the Second Computational Color Imaging Workshop, CCIW 2009, which was held in Saint-Etienne, France, in March 2009. The 23 revised full papers, presented together with one invited paper, were carefully reviewed and selected from 40 submissions. The papers, which contain a total of 114 colored... more...