The Leading eBooks Store Online

3,725,826 members ⚫ 1,209,635 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • RESILIA ?by AXELOS

    The Stationery Office Ltd 2015; US$ 165.00

    RESILIA? Cyber Resilience Best Practices offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes. more...

  • RESILIA? Pocketbookby AXELOS

    The Stationery Office Ltd 2015; US$ 4.99

    RESILIA? Cyber Resilience Best Practices offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes. This pocketbook concisely summarizes the core... more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • Stealing Your Lifeby Frank W. Abagnale

    Crown/Archetype 2007; US$ 15.99

    The charismatic forger immortalized in the film Catch Me If You Can exposes the astonishing tactics of today?s identity theft criminals and offers powerful strategies to thwart them based on his second career as an acclaimed fraud-fighting consultant. Consider these sobering facts:         *Six out of ten American companies and government agencies... more...

  • Security in Computing and Communicationsby Jemal H. Abawajy; Sougata Mukherjea; Sabu M. Thampi; Antonio Ruiz-Martínez

    Springer International Publishing 2015; US$ 77.17

    This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security... more...

  • Security and Cryptography for Networksby Michel Abdalla; Roberto De Prisco

    Springer International Publishing 2014; US$ 74.00

    This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom... more...

  • Securing Your Business with Cisco ASA and PIX Firewallsby Greg Abelar

    Pearson Education 2005; US$ 32.00

    Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent  Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...

  • Face Biometrics for Personal Identificationby Besma Abidi; Mongi A. Abidi

    Springer Berlin Heidelberg 2007; US$ 116.29

    This book provides ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions in the biometrics field. It offers students and software engineers a thorough understanding of how some core low-level building blocks of a multi-biometric system are implemented. While this book covers a range of biometric... more...

  • Security Einfach Machenby Ferri Abolhassan

    Springer Fachmedien Wiesbaden 2016; US$ 31.08

    In diesem Buch beleuchten Autoren aus der Politik, Wirtschaft und Forschung das Thema Security: Was wird sie kosten und wer wird sie anbieten? Wird Security vielleicht sogar Spaß machen? Das Internet der Dinge wird nicht einmal zehn Jahre brauchen, um 2020 mehr als 50 Milliarden Geräte zu vernetzen. Digitalisierung rast durch alle Bereiche... more...

  • Jihadists and Weapons of Mass Destructionby Gary Ackerman; Jeremy Tamsett

    CRC Press 2009; US$ 99.95

    This title explores the nexus formed when malevolent actors access malignant means. Written for professionals, academics, and policymakers working at the forefront of counter terrorism efforts, "Jihadists and Weapons of Mass Destruction" is an authoritative and comprehensive work addressing the threat of weapons of mass destruction (WMD)... more...