The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Logic

  • A List of Successes That Can Change the Worldby Sam Lindley; Conor McBride; Phil Trinder; Don Sannella

    Springer International Publishing 2016; US$ 107.00

    This volume is published in Honor of PhilipWadler on the occasion of his 60th birthday, and the collection of papers forma Festschrift for him. The contributions are made by some of the many who knowPhil and have been influenced by him. The research papers included hererepresent some of the areas in which Phil has been active, and the editorsthank... more...

  • DDoS Attacksby Dhruba Kumar Bhattacharyya; Jugal Kumar Kalita

    CRC Press 2016; US$ 99.95

    DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces... more...

  • Iris Biometric Model for Secured Network Accessby Franjieh El Khoury

    CRC Press 2016; US$ 125.95

    In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem... more...

  • Unauthorized Accessby Robert H. Sloan; Richard Warner

    CRC Press 2016; US$ 64.95

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors?two... more...

  • Computational Number Theoryby Abhijit Das

    CRC Press 2016; US$ 97.95

    Developed from the author?s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and practitioners... more...

  • Computer Security Literacyby Douglas Jacobson; Joseph Idziorek

    CRC Press 2016; US$ 57.95

    Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform ( or do not perform ). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical... more...

  • Secret Historyby Craig P. Bauer

    CRC Press 2016; US$ 83.95

    Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites,... more...

  • Security and Policy Driven Computingby Lei Liu

    CRC Press 2016; US$ 99.95

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and... more...

  • Introduction to Cryptography with Open-Source Softwareby Alasdair McAndrew

    CRC Press 2016; US$ 90.95

    Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience... more...

  • Distributed Networksby Qurban A. Memon

    CRC Press 2016; US$ 194.95

    For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific... more...