The Leading eBooks Store Online
3,508,729 members ⚫ 2,065,349 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Springer International Publishing 2016; US$ 54.99
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness... more...
- Elsevier Science 2014; US$ 49.95
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security... more...
- The Stationery Office Ltd 2015; US$ 165.00
RESILIA? Cyber Resilience Best Practices offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes. more...
- The Stationery Office Ltd 2015; US$ 16.00
RESILIA? Cyber Resilience Best Practices offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes. This pocketbook concisely summarizes the core... more...
- Crown/Archetype 2007; US$ 15.99
The charismatic forger immortalized in the film Catch Me If You Can exposes the astonishing tactics of today?s identity theft criminals and offers powerful strategies to thwart them based on his second career as an acclaimed fraud-fighting consultant. Consider these sobering facts: *Six out of ten American companies and government agencies... more...
- Springer International Publishing 2015; US$ 119.00
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security... more...
- Springer International Publishing 2014; US$ 119.00
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom... more...
- Pearson Education 2005; US$ 32.00
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall,... more...
- Springer Berlin Heidelberg 2007; US$ 179.00
This book provides ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions in the biometrics field. It offers students and software engineers a thorough understanding of how some core low-level building blocks of a multi-biometric system are implemented. While this book covers a range of biometric... more...
- CRC Press 2009; US$ 99.95
This title explores the nexus formed when malevolent actors access malignant means. Written for professionals, academics, and policymakers working at the forefront of counter terrorism efforts, "Jihadists and Weapons of Mass Destruction" is an authoritative and comprehensive work addressing the threat of weapons of mass destruction (WMD)... more...