The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Addison-Wesley Longman 1995; US$ 14.95
The authoritative guide to the ISA specification for internal PC data exchange. ISA System Architecture provides a detailed tutorial on how Intel X86 microprocessors communicate with memory and I/O devices, theory on the operation of RAM and ROM devices, along with implementations commonly used in ISA systems, and detailed discussion of the ISA... more...
- Addison-Wesley Longman 2001; US$ 19.95
PCI-X System Architecture is a detailed and comprehensive guide to the PCI-X technology. It highlights the many changes and improvements from PCI 2.2 to PCI-X, so that you can build on your PCI knowledge to master PCI-X with greater ease. The book discusses the drawbacks of PCI and how PCI-X solves these problems to achieve faster transfer rates.... more...
- Addison-Wesley Longman 1999; US$ 19.95
Now in its fourth edition, PCI System Architecture provides a detailed review of the PCI Rev 2.2 spec in an easy to understand manner. It also covers the following specs: 1.1 PCI-to-PCI Bridge Specification, 2.1 PCI BIOS Specification, 1.1 PCI Bus Power Management Interface Specification, and 1.0 PCI Hot-Plug Specification. more...
- Wiley 2002; US$ 59.99
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into... more...
- Wiley 2002; US$ 39.99
The latest release of CORBA boasts many new features that were highly anticipated by developers, including all of the necessary services for building fully distributed applications regardless of platform or programming language. Written by a leading international authority on CORBA and the bestselling author of CORBA 3 Fundamentals and Programming,... more...
- Wiley 2001; US$ 54.99
Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability... more...
- Wiley 2002; US$ 39.99
The only complete technical guide to building integrated business systems using the convergent architecture approach In his groundbreaking Business Engineering with Object Technology (0-471-04521-7), David Taylor introduced the concept of convergent architecture (CA), a framework for building the business design directly into the software systems that... more...
- John Wiley & Sons, Inc. 2002; US$ 60.00
Well-designed graphical user interfaces (GUIs) for business systems can greatly increase user productivity, but designing them can be difficult and time consuming. This book walks developers through the basics of good interface design, using real-world examples from systems that are proven successes. Galitz is an internationally recognized consultant,... more...
- Syngress Publishing 2001; US$ 51.95
Because security and network performance - the two pronged purpose of ISA Server - are so important in todays interconnected world, ISA Server plays a vital role in your overall network design. Configuring ISA Server 2000 will play an equally vital role in helping you understand Microsoft's much-anticipated Web-caching, filtering, and connection-sharing... more...
- Syngress Publishing 2002; US$ 51.95
Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth... more...