The Leading eBooks Store Online

3,757,227 members ⚫ 1,221,934 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computers - special aspects

Most popular at the top

  • Microsoft SQL Server 2012 Bibleby Adam Jorgensen; Jorge Segarra; Patrick LeBlanc; Jose Chinchilla; Aaron Nelson

    Wiley 2012; US$ 47.99 US$ 41.99

    Harness the powerful new SQL Server 2012 Microsoft SQL Server 2012 is the most significant update to this product since 2005, and it may change how database administrators and developers perform many aspects of their jobs. If you're a database administrator or developer, Microsoft SQL Server 2012 Bible teaches you everything you need to take... more...

  • Education and social justice in a digital ageby Rosamund Sutherland

    Policy Press 2013; US$ 39.95

    This book proposes an approach to changing the educational system in order to redress inequalities in society, whilst at the same time acknowledging the potential transformative role of digital technologies. more...

  • Social Media Design For Dummiesby Janine Warner; David LaFontaine

    Wiley 2014; US$ 29.99 US$ 27.29

    Learn to design professional and effective social media profiles! Whether you're trying to attract a new employer or get new fans to notice your brand, your social media profiles need to distinguish you from the masses. Packed with the secrets behind the hottest Facebook timelines, Twitter backgrounds, and LinkedIn profiles, this fun-but-straightforward... more...

  • Combinatorial Search Problemsby Gyula Katona

    Springer Vienna 2014; US$ 81.80

    more...

  • Hack Attacks Revealedby John Chirillo

    Wiley 2002; US$ 59.99 US$ 52.99

    The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into... more...

  • PowerPC System Architectureby Tom Shanley; Inc. Mindshare

    Addison-Wesley Longman 1995; US$ 9.95

    PowerPC System Architecture describes the hardware architecture of PowerPC systems, providing a clear, concise explanation of the PowerPC specification, the template upon which all PowerPC processors are designed. The author provides a complete description of the specification for both the 32- and 64-bit implementations. The second half of the... more...

  • Protected Mode Software Architectureby Tom Shanley; Inc. Mindshare

    Addison-Wesley Longman 1996; US$ 12.95

    A fundamental understanding of Protected Mode vs. Real Mode operation is key to understanding the basic PC platform. MindShare's book, Protected Mode Software Architecture , details Protected Mode and Real Mode operation and the challenges associated with each. more...

  • Hack Attacks Deniedby John Chirillo

    Wiley 2001; US$ 54.99 US$ 48.50

    Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability... more...

  • Convergent Architectureby Richard Hubert

    Wiley 2002; US$ 39.99 US$ 34.99

    The only complete technical guide to building integrated business systems using the convergent architecture approach In his groundbreaking Business Engineering with Object Technology (0-471-04521-7), David Taylor introduced the concept of convergent architecture (CA), a framework for building the business design directly into the software systems... more...

  • Pentium Processor System Architecture, Second Editionby Tom Shanley; Don Anderson

    Addison-Wesley Longman 1995; US$ 9.95

    A comprehensive description of the Pentium microprocessor and its relationship to the remainder of the system. Emphasis is placed on the interaction of the processor's execution units, internal caches, and the external cache and system memory. The different types of Pentium bus transfers are described in detail. more...