The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Security

  • Statistical Methods in Computer Securityby

    Taylor and Francis 2004; US$ 146.95

    Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct... more...

  • Protection, Security, and Safeguardsby

    Taylor and Francis 2000; US$ 125.95

    Our need for security has not waned since the dawn of civilization - it has only increased and become more complicated. Protection, Security, and Safeguards: Practical Approaches and Perspectives draws on the security prowess of former secret service agents and other notable security professionals as the authors touch on nearly every facet of the industry.... more...

  • Distributed Networksby

    Taylor and Francis 2013; US$ 159.95

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific... more...

  • Stealing Your Lifeby Frank W. Abagnale

    Crown Publishing Group 2007; US$ 15.99

    The charismatic forger immortalized in the film Catch Me If You Can exposes the astonishing tactics of today?s identity theft criminals and offers powerful strategies to thwart them based on his second career as an acclaimed fraud-fighting consultant. Consider these sobering facts:         *Six out of ten American companies and government agencies... more...

  • Securing Your Business with Cisco ASA and PIX Firewalls, Adobe Readerby Greg Abelar

    Pearson Education 2005; US$ 32.00

    Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent  Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...

  • Jihadists and Weapons of Mass Destructionby Gary Ackerman; Jeremy Tamsett

    Taylor and Francis 2009; US$ 96.95

    This title explores the nexus formed when malevolent actors access malignant means. Written for professionals, academics, and policymakers working at the forefront of counter terrorism efforts, "Jihadists and Weapons of Mass Destruction" is an authoritative and comprehensive work addressing the threat of weapons of mass destruction (WMD)... more...

  • Digital Privacyby Alessandro Acquisti; Stefanos Gritzalis; Costos Lambrinoudakis; Sabrina di Vimercati

    Taylor and Francis 2007; US$ 91.95

    While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental... more...

  • How to Cheat at IIS 7 Server Administrationby Chris Adams

    Elsevier Science 2007; US$ 51.95

    According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of... more...

  • Data Analysis for Network Cyber-Securityby Niall Adams; Nicholas Heard

    World Scientific Publishing Company 2014; US$ 117.00

    There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing,... more...

  • Cold Casesby James M. Adcock; Sarah L. Stein

    Taylor and Francis 2014; US$ 99.95

    Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United States are not able to dedicate the resources necessary to support the cold case investigation process. However, when those cases are fully pursued and prosecuted, they often result in convictions and lengthy prison terms.... more...