The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Taylor and Francis 2013; US$ 79.95
As organizations deploy business intelligence and analytic systems to harness business value from their data assets, data governance programs are quickly gaining prominence. And, although data management issues have traditionally been addressed by IT departments, organizational issues critical to successful data management require the implementation... more...
- Taylor and Francis 2004; US$ 146.95
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct... more...
- Taylor and Francis 2000; US$ 125.95
Our need for security has not waned since the dawn of civilization - it has only increased and become more complicated. Protection, Security, and Safeguards: Practical Approaches and Perspectives draws on the security prowess of former secret service agents and other notable security professionals as the authors touch on nearly every facet of the industry.... more...
- Crown Publishing Group 2007; US$ 15.99
The charismatic forger immortalized in the film Catch Me If You Can exposes the astonishing tactics of today?s identity theft criminals and offers powerful strategies to thwart them based on his second career as an acclaimed fraud-fighting consultant. Consider these sobering facts: *Six out of ten American companies and government agencies... more...
- Pearson Education 2005; US$ 32.00
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...
- Taylor and Francis 2009; US$ 96.95
This title explores the nexus formed when malevolent actors access malignant means. Written for professionals, academics, and policymakers working at the forefront of counter terrorism efforts, "Jihadists and Weapons of Mass Destruction" is an authoritative and comprehensive work addressing the threat of weapons of mass destruction (WMD)... more...
- Taylor and Francis 2007; US$ 91.95
While traveling the data highway through the global village, most people, if they think about it at all, consider privacy a non-forfeitable right. They expect to have control over the ways in which their personal information is obtained, distributed, shared, and used by any other entity. According to recent surveys, privacy, and anonymity are the fundamental... more...
- Elsevier Science 2007; US$ 51.95
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of... more...
- World Scientific Publishing Company 2014; US$ 117.00
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing,... more...
- Taylor and Francis 2014; US$ 99.95
Most agencies do little cold-case work due to tenuous funding, low success rates, and inconsistent access to databases. Written by experts who conduct training and consulting worldwide, this text enables police and public safety agencies?whether large or small, domestic or international?to more easily get these cases to court. It provides readers... more...