The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Taylor and Francis 2014; US$ 59.95
All too often, professional investigations fail because those involved jump to conclusions and draw faulty premises that leave the trail cold. Correct conclusions are not the result of guessing, but by applying efficient thought processes. Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations is designed... more...
- Taylor and Francis 2014; US$ 79.95
College campuses are unique environments and emergency management teams at these institutions have a responsibility to ensure the safety and welfare of the campus community?including the staff, students, and the families of students. This book examines the specific government requirements for emergency preparedness for campuses?particularly government-funded... more...
- Packt Publishing 2014;
An easy-to-follow, hands-on guide that provides a detailed insights of each and every component of the Chef architecture and its deployment in the real world.If you are a system administrator, Linux administrator, cloud developer, cloud administrator or someone who just wants to learn and apply Chef automation on your existing or new infrastructure,... more...
- Elsevier Science 2014; US$ 54.95
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization?s most important asset?its proprietary information?safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and... more...
- Taylor and Francis 2014; US$ 69.95
HealthCare Information Security and Privacy Practitioners (HCISPP SM ) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient... more...
- McGraw-Hill Education 2014; US$ 60.00
Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative guide fully addresses cyber forensics techniques, standards, technologies, and legal and ethical principles. You'll find learning objectives... more...
- Elsevier Science 2014; US$ 64.95
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level... more...
- McGraw-Hill Education 2014; US$ 40.00
Proven Methods for Building Secure Java-Based Web Applications Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing... more...
- O'Reilly Media 2014; US$ 21.99
"People are stupid, Davis Wolfgang Hawke thought as he stared at the nearly empty box of Swastika pendants on his desk." So begins Spam Kings , an investigative look into the shady world of email spammers and the people trying to stop them. This compelling exposť explores the shadowy world of the people responsible for today?s junk-email epidemic.... more...
- Taylor and Francis 2014; US$ 119.95
In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...