The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- dpunkt.verlag 2013; Not Available
Hauptbeschreibung Diese Neuausgabe des Praxisbuchs zeigt, wie Sie OS X Mavericks fu¨r Ihre Bedu¨rfnisse optimal nutzen. Apples OS X ist das wohl fortschrittlichste Betriebssystem mit einem nahezu unbegrenzten Spektrum an Möglichkeiten. Antoni Nadir Cherif erklärt, wie Sie Ihren Mac noch effizienter einsetzen. Lernen Sie, wie Sie Ihre Daten intuitiv... more...
- dpunkt.verlag 2013; Not Available
Hauptbeschreibung Git ist ein ma¨chtiges Werkzeug zur verteilten Versionsverwaltung. Es macht vieles mo¨glich, was mit klassischen Versionsverwaltungen gar nicht oder nur unter großen Mu¨hen ging. Gits Vielfalt an Kommandos, Optionen und Konfi- gurationen wirkt anfangs oft einschu¨chternd - obwohl die Grundkonzepte einfach sind und man meist nur... more...
- CRC Press 2005; US$ 87.95
A veteran of computer technology and especially computer security, Peltier presents a variety of concepts and ideas about risk analysis, and demonstrates how they can be used. He covers risk management, the risk assessment process, quantitative versus qualitative approaches, other forms of qualitative risk assessment, the facilitated risk analysis more...
- Springer 2007; US$ 19.95
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... more...
- BS Publications 2007; US$ 50.00
This book is written with emphasis on practical programming examples, with inputs of theory and concepts behind the programming. The book is divided into two parts, the first part focusing on Advanced Unix programming and the second part on Compiler design. The book aims at providing a compatible way of attempting the problems through detailed algorithm... more...
- Wiley 2013; US$ 85.00
Essential guidance for the financial auditor in need of a working knowledge of IT If you're a financial auditor needing working knowledge of IT and application controls, Automated Auditing Financial Applications for Small and Mid-Sized Businesses provides you with the guidance you need. Conceptual overviews of key IT auditing issues are included,... more...
- Elsevier Science 2013; US$ 59.95
Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that... more...
- Springer 2014; US$ 79.99
Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity... more...
- Springer 2014; US$ 29.99
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored... more...
- Packt Publishing 2013; US$ 16.99
A step-by-step tutorial-based guide aimed at giving you hands-on practical experience to develop AR applications for Android.Augmented Reality for Android Application Development is for Android mobile application developers who are familiar with Android Development Tools and deployment, JMonkeyEngine, and the Vuforia SDK. more...