The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Artech House 2008; US$ 131.00
This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed... more...
- Artech House 2008; US$ 79.00
This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there... more...
- Artech House 2008; US$ 116.00
This practical book offers you expert guidance on sensors and the preprocessing of sensed data, the handling of sensed data with secure and safe procedures, and the design, modeling and simulation of complex HS systems. You learn how to store, encrypt and mine sensitive data. Further, the book shows how data is transmitted and received along wired... more...
- Wiley 2007; US$ 65.00
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of... more...
- McGraw-Hill Education 2009; US$ 57.00
Malware and rootkits are on the rise and becoming more complex, according to security company McAfee Author speaks at major security conferences worldwide Hands-on examples, attacks, and countermeasures are included in every chapter more...
- Course Technology PTR 2007; US$ 49.99
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security concerns... more...
- IT Governance Ltd 2009; US$ 99.90
The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field. more...
- IT Governance Publishing 2008; US$ 45.95
CyberWar, CyberTerror, CyberCrime provides a stark and timely analysis of the increasingly hostile online landscape that todays corporate systems inhabit, and gives a practical introduction to the defensive strategies that can be employed in response. more...
- IT Governance Ltd 2009; US$ 29.90
Addressing the scope of risks involved in a modern IT system, this pocket guide outlines strategies for working through the process of putting risk management at the heart of your corporate culture. Since no two companies are the same, this pocket guide should not be taken as a step-by-step guide, but should provide decision makers with a solid overview... more...
- McGraw-Hill Education 2010; US$ 49.99
Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms.... more...