The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • The Re-Evolution of American Street Gangsby

    Taylor and Francis 2015; US$ 79.95

    Addressing the intricacies and diversities of street gangs, a major and growing blight across the country, this book draws on the expertise of high-ranking law enforcement officials monitoring terrorist activity and gang-related crimes as well as professional private investigators who have spent several decades investigating gangs and learning their... more...

  • Statistical Methods in Computer Securityby

    Taylor and Francis 2004; US$ 146.95

    Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct... more...

  • Protection, Security, and Safeguardsby

    Taylor and Francis 2000; US$ 125.95

    Our need for security has not waned since the dawn of civilization - it has only increased and become more complicated. Protection, Security, and Safeguards: Practical Approaches and Perspectives draws on the security prowess of former secret service agents and other notable security professionals as the authors touch on nearly every facet of the industry.... more...

  • Distributed Networksby

    Taylor and Francis 2013; US$ 159.95

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific... more...

  • Securing VoIPby Regis J. Jr (Bud) Bates

    Elsevier Science 2014; US$ 49.95

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...

  • Stealing Your Lifeby Frank W. Abagnale

    Crown Publishing Group 2007; US$ 15.99

    The charismatic forger immortalized in the film Catch Me If You Can exposes the astonishing tactics of today?s identity theft criminals and offers powerful strategies to thwart them based on his second career as an acclaimed fraud-fighting consultant. Consider these sobering facts:         *Six out of ten American companies and government agencies... more...

  • Securing Your Business with Cisco ASA and PIX Firewalls, Adobe Readerby Greg Abelar

    Pearson Education 2005; US$ 32.00

    Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent  Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...

  • Jihadists and Weapons of Mass Destructionby Gary Ackerman; Jeremy Tamsett

    Taylor and Francis 2009; US$ 96.95

    This title explores the nexus formed when malevolent actors access malignant means. Written for professionals, academics, and policymakers working at the forefront of counter terrorism efforts, "Jihadists and Weapons of Mass Destruction" is an authoritative and comprehensive work addressing the threat of weapons of mass destruction (WMD)... more...

  • Digital Privacyby Alessandro Acquisti; Stefanos Gritzalis; Costos Lambrinoudakis; Sabrina di Vimercati

    Taylor and Francis 2007; US$ 91.95

    While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental... more...

  • How to Cheat at IIS 7 Server Administrationby Chris Adams

    Elsevier Science 2007; US$ 51.95

    According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of... more...