The Leading eBooks Store Online

3,720,765 members ⚫ 1,207,593 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books

Most popular at the top

  • Aprender a interpretar el electrocardiogramaby F. Javier Montero Pérez

    Elsevier Health Sciences Spain 2015; US$ 29.25

    Obra dirigida por el Dr. Montero Pérez, resultado de la dilatada trayectoria del autor como docente y en práctica clínica. Se trata de una obra muy didáctica que ayudará al estudiante de Ciencias de la salud a comprender la electrocardiografía , abarcando desde los aspectos más teóricos hasta ejercicios prácticos que le ayudarán a saber cómo... more...

  • Practical Reverse Engineeringby Bruce Dang; Alexandre Gazet; Elias Bachaalany; Sé Josse; bastien

    Wiley 2014; US$ 50.00 US$ 43.33

    Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools... more...

  • Mobile Networks Architectureby Andr? Perez

    Wiley 2013; US$ 145.00 US$ 125.67

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies: – 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution; – 3G: the UMTS (Universal Mobile Telecommunications System) network and... more...

  • IP, Ethernet and MPLS Networksby Andr? Perez

    Wiley 2013; US$ 145.00 US$ 125.67

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters:... more...

  • Voice over LTEby Andr? Perez

    Wiley 2013; US$ 100.95 US$ 87.49

    Voice over LTE (Long Term Evolution) presents the mechanisms put in place in 4G mobile networks for the transportation of IP packets containing voice data and telephone signaling, as well as the technologies used to provide a telephone service in the IMS (IP Multimedia Sub-system) network. Despite the difficulty connected to the handover of the 4G... more...

  • VoLTE and ViLTEby Andr? Perez

    Wiley 2016; US$ 140.00 US$ 121.33

    This book presents the architecture of two networks that make up the backbone of the telephone service VoLTE and video service ViLTE. The 4G mobile network makes it possible to construct bearers through which IP packets, containing either telephone signals  (SIP, SDP) or voice or video media (RTP stream), are transported. The IMS network performs... more...

  • Network Securityby Andr? Perez

    Wiley 2014; US$ 140.00 US$ 121.33

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection... more...

  • LTE & LTE Advancedby Andr? Perez

    Wiley 2015; US$ 120.00 US$ 104.00

    This book presents the technical characteristics of the two radio network interfaces of mobile 4G, LTE and LTE Advanced, based on Release 8, 9 and 10 of the 3GPP specifications. Points covered include a detailed description of various components of the radio interface. RRC signaling messages used to establish the connection, enabling the security,... more...

  • Handbook of Reagents for Organic Synthesisby André Charette; B.

    Wiley 2015; US$ 247.50 US$ 214.50

    Heteroarenes are among the most prevalent structural units in natural products, pharmaceuticals, agrochemicals, and other compounds of scientific or commercial interest. In the last decade, a broad range of novel synthetic methods has been developed to not only facilitate construction of the heteroarene motif, but to enable its modification through... more...

  • Die 7 Wege des Samuraiby André Daiy? Steiner;

    Wiley 2015; US$ 13.50 US$ 11.70

    "Der höchste Sieg des Samurai liegt nicht in der Überwindung des anderen, sondern im Sieg über sich selbst." (Weisheit der Samurai) Das Handeln eines japanischen Samurai-Kriegers ruht auf einem festen Fundament von ethischen Grundwerten - beschrieben als "die sieben Wege". Einmal innerlich verankert, bieten diese eine Quelle der Kraft... more...