The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Data structures

Most popular at the top

  • Advanced Topics in Cby Noel Kalicharan

    Springer 2013; US$ 34.99

    C is the most widely used programming language of all time. It has been used to create almost every category of software imaginable and the list keeps growing every day. Cutting-edge applications, such as Arduino, embeddable and wearable computing are ready-made for C.   Advanced Topics In C teaches concepts that any budding programmer should know.... more...

  • Cryptography in Constant Parallel Timeby Benny Applebaum

    Springer 2013; US$ 109.00

    Locally computable (NC0) functions are 'simple' functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such... more...

  • Data Structures, Computer Graphics, and Pattern Recognitionby A. Klinger; K. S. Fu; T. L. Kunii

    Elsevier Science 2014; US$ 93.95

    Data Structures, Computer Graphics, and Pattern Recognition more...

  • Combinatorial Mapsby Guillaume Damiand; Pascal Lienhardt

    CRC Press 2015; US$ 99.95

    A Versatile Framework for Handling Subdivided Geometric Objects Combinatorial Maps: Efficient Data Structures for Computer Graphics and Image Processing gathers important ideas related to combinatorial maps and explains how the maps are applied in geometric modeling and image processing. It focuses on two subclasses of combinatorial maps: n... more...

  • Frontiers of Higher Order Fuzzy Setsby Alireza Sadeghian; Hooman Tahayori

    Springer New York 2014; US$ 179.00

    Providing a unified representation theorem for higher-order fuzzy sets, this volume elaborates on the concept of gradual elements and their integration with these sets, as well as discussing their applications in a range of fields, some of which are new. more...

  • Computational Red Teamingby Hussein A. Abbass

    Springer International Publishing 2014; US$ 129.00

    Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He... more...

  • Authentication in Insecure Environmentsby Sebastian Pape

    Springer Fachmedien Wiesbaden 2014; US$ 109.00

    Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether... more...

  • Kryptologieby Albrecht Beutelspacher

    Springer Fachmedien Wiesbaden 2014; US$ 29.95

    Das Buch bietet eine reich illustrierte, leicht verdauliche und amüsante Einführung in die Kryptologie. Diese Wissenschaft beschäftigt sich damit, Nachrichten vor unbefugtem Lesen und unberechtigter Änderung zu schützen. Ein besonderer Akzent liegt auf der Behandlung moderner Entwicklungen. Dazu gehören Sicherheit im Handy, elektronisches Geld, Zugangskontrolle... more...

  • Modeling & Simulation-Based Data Engineeringby Bernard P. Zeigler; Phillip E Hammonds

    Elsevier Science 2007; US$ 103.00

    Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric Global Information... more...

  • Ontologies for Software Engineering and Software Technologyby Coral Calero; Francisco Ruiz; Mario Piattini

    Springer 2006; US$ 159.00

    Covers two applications of ontologies in software engineering and software technology: sharing knowledge of the problem domain and using a common terminology among all stakeholders; and filtering the knowledge when defining models and metamodels. This book is of benefit to software engineering researchers in both academia and industry. more...