The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computers - special aspects

  • Practical Speech User Interface Designby James R. Lewis

    CRC Press 2016; US$ 109.95

    Although speech is the most natural form of communication between humans, most people find using speech to communicate with machines anything but natural. Drawing from psychology, human-computer interaction, linguistics, and communication theory, Practical Speech User Interface Design provides a comprehensive yet concise survey of practical speech... more...

  • The Debugger's Handbookby J.F. DiMarzio

    CRC Press 2016; US$ 115.95

    For today's programmers, it is impossible to foresee every input, every usage scenario, and every combination of applications that can cause errors when run simultaneously. Given all of these unknowns, writing absolutely bug-free code is unachievable. But it is possible, with the right knowledge, to produce nearly bug-free code and The Debugger's Handbook... more...

  • Data Protectionby David G. Hill

    CRC Press 2016; US$ 87.95

    Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection. The author begins by building the foundation... more...

  • Secret Historyby Craig P. Bauer

    CRC Press 2016; US$ 83.95

    Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites,... more...

  • Attaining High Performance Communicationsby Ada Gavrilovska

    CRC Press 2016; US$ 94.95

    Technological Advances and Problems of High Performance Communications An ecosystem of solutions along a stack of technology layers Cohesively collecting state-of-the-art contributions from leading researchers in industry, national laboratories, and academia, Attaining High Performance Communications: A Vertical Approach discusses various... more...

  • Granular Computingby Witold Pedrycz

    CRC Press 2016; US$ 154.95

    Information granules, as encountered in natural language, are implicit in nature. To make them fully operational so they can be effectively used to analyze and design intelligent systems, information granules need to be made explicit. An emerging discipline, granular computing focuses on formalizing information granules and unifying them to create... more...

  • Information Security Policy Development for Complianceby Barry L. Williams

    CRC Press 2016; US$ 59.95

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies... more...

  • Security and Policy Driven Computingby Lei Liu

    CRC Press 2016; US$ 99.95

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and... more...

  • Computers and Societyby Lisa C. Kaczmarczyk

    CRC Press 2016; US$ 78.95

    Since computer scientists make decisions every day that have societal context and influence, an understanding of society and computing together should be integrated into computer science education. Showing students what they can do with their computing degree, Computers and Society: Computing for Good uses concrete examples and case studies to highlight... more...

  • Identification and Management of Distributed Databy Giovanni Bartolomeo; Tatiana Kovacikova

    CRC Press 2016; US$ 94.95

    Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates... more...