The Leading eBooks Store Online

3,788,875 members ⚫ 1,234,658 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computers - special aspects

Most popular at the top

  • DB2 Developer's Guideby Craig S. Mullins

    Pearson Education 2004; US$ 59.99

    Learn the best techniques and tricks from expert author Craig Mullins. Apply these real-world pieces of advice, undocumented tips, solutions, projects, and techniques to your own database management system. Mullins gives you what you need to take your DB2 development to the next level. Written by a developer for developers, DB2 Developer¿s Guide,... more...

  • Visual FoxPro to Visual Basic .NETby Les Pinter

    Pearson Education 2004; US$ 43.99

    Starting with simple examples, you¿ll see how the multi-user, local area network applications that Visual FoxPro developers are used to building are constructed in Visual Basic .NET. You¿ll learn how to use Crystal Reports to build reports like the ones you build in FoxPro. You¿ll discover how to use DataAdapters and datasets instead of DBFs. You¿ll... more...

  • Microsoft Access 2003 Forms, Reports, and Queriesby Paul McFedries

    Pearson Education 2004; US$ 27.99

    When it comes to job-productivity, we all want to be able to perform well, especially when it comes to challenging assignments. Anyone who works with Microsoft Access on a regular basis knows that this program can prove to be one of the most challenging. If you are looking for a way to get the most you can out of the primary Access tasks, Microsoft... more...

  • Beginning Regular Expressionsby Andrew Watt

    Wiley 2005; US$ 57.95 US$ 50.99

    This book introduces the various parts of the construction of a regular expression pattern, explains what they mean, and walks you through working examples showing how they work and why they do what they do. By working through the examples, you will build your understanding of how to make regular expressions do what you want them to do and avoid creating... more...

  • Robust Range Image Registration Using Genetic Algorithms and the Surface Interpenetration Measureby Luciano Silva; Olga R. P. Bellon; Kim L. Boyer

    World Scientific Publishing Company 2005; US$ 91.00 US$ 82.81

    This book addresses the range image registration problem for automatic 3D model construction. The focus is on obtaining highly precise alignments between different view pairs of the same object to avoid 3D model distortions; in contrast to most prior work, the view pairs may exhibit relatively little overlap and need not be prealigned. more...

  • Design Methods and Applications for Distributed Embedded Systemsby Bernd Kleinjohann; Guang R. Gao; Hermann Kopetz; Lisa Kleinjohann; Achim Rettberg

    Springer US 2006; US$ 74.30

    The IFIP TC-10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2004) brings together experts from industry and academia to discuss recent developments in this important and growing field in the splendid city of Toulouse, France. The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to... more...

  • CISSP Training Guideby Roberta Bragg

    Pearson Education 2002; US$ 59.99

    The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography,... more...

  • Novell ZENworks for Desktops 4 Administrator's Handbookby Brad Dayley

    Pearson Education 2003; US$ 31.99

    To help customers reduce the growing cost of managing employee computers both in the office and on the road, Novell created Novell® ZENworks® for Desktops 4. ZENworks stands for Zero Effort Networks. Built to operate over the Internet as well as internal networks, ZENworks for Desktops 4 automates key network management tasks so IT professionals... more...

  • Security+ Certification Exam Cram 2 (Exam Cram SYO-101)by Kirk Hausman; Diane Barrett; Martin Weiss; Ed Tittel

    Pearson Education 2003; US$ 31.99

    A new edition of this title is available, ISBN-10: 078973804X ISBN-13: 9780789738042   The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a need to better train, staff, and empower those tasked with designing and implementing information... more...

  • Intelligent Watermarking Techniquesby Jeng-Shyang Pan; Hsiang-Cheh Huang; Lakhmi C. Jain

    World Scientific Publishing Company 2004; US$ 180.00 US$ 163.80

    Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected... more...