The Leading eBooks Store Online
3,508,729 members ⚫ 2,065,349 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Addison-Wesley Longman 1995; US$ 14.95
The authoritative guide to the ISA specification for internal PC data exchange. ISA System Architecture provides a detailed tutorial on how Intel X86 microprocessors communicate with memory and I/O devices, theory on the operation of RAM and ROM devices, along with implementations commonly used in ISA systems, and detailed discussion of the ISA... more...
- Addison-Wesley Longman 2001; US$ 19.95
PCI-X System Architecture is a detailed and comprehensive guide to the PCI-X technology. It highlights the many changes and improvements from PCI 2.2 to PCI-X, so that you can build on your PCI knowledge to master PCI-X with greater ease. The book discusses the drawbacks of PCI and how PCI-X solves these problems to achieve faster transfer rates.... more...
- Addison-Wesley Longman 1999; US$ 19.95
Now in its fourth edition, PCI System Architecture provides a detailed review of the PCI Rev 2.2 spec in an easy to understand manner. It also covers the following specs: 1.1 PCI-to-PCI Bridge Specification, 2.1 PCI BIOS Specification, 1.1 PCI Bus Power Management Interface Specification, and 1.0 PCI Hot-Plug Specification. more...
- Wiley 2002; US$ 59.99
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into... more...
- Wiley 2002; US$ 39.99
The latest release of CORBA boasts many new features that were highly anticipated by developers, including all of the necessary services for building fully distributed applications regardless of platform or programming language. Written by a leading international authority on CORBA and the bestselling author of CORBA 3 Fundamentals and Programming,... more...
- Addison-Wesley Longman 1995; US$ 9.95
PowerPC System Architecture describes the hardware architecture of PowerPC systems, providing a clear, concise explanation of the PowerPC specification, the template upon which all PowerPC processors are designed. The author provides a complete description of the specification for both the 32- and 64-bit implementations. The second half of the... more...
- Addison-Wesley Longman 1996; US$ 12.95
A fundamental understanding of Protected Mode vs. Real Mode operation is key to understanding the basic PC platform. MindShare's book, Protected Mode Software Architecture , details Protected Mode and Real Mode operation and the challenges associated with each. more...
- Wiley 2003; US$ 50.00
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable... more...
- Wiley 2011; US$ 120.00
Geared to IT professionals eager to get into the all-important field of data warehousing, this book explores all topics needed by those who design and implement data warehouses. Readers will learn about planning requirements, architecture, infrastructure, data preparation, information delivery, implementation, and maintenance. They'll also find a wealth... more...
- Wiley 2003; US$ 55.00
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management... more...