The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
System design; Periodicals

Most popular at the top

  • A Networking Approach to Grid Computingby Daniel Minoli

    Wiley 2004; US$ 146.00

    DANIEL MINOLI has many years of IT, telecom, and networking experience for end users and carriers including work at AIG, ARPA think tanks, Bell Telephone Laboratories, ITT, Prudential Securities, Bell Communications Research (Bellcore/Telcordia), AT&T, Gartner/DataPro, and high-tech incubator Leading Edge Networks Inc. He is the author of several... more...

  • Network Security Bibleby Eric Cole; Ronald L. Krutz; James Conley

    Wiley 2005; US$ 39.99

    A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The... more...

  • FileMaker Pro 7 Bibleby Steven A. Schwartz; Dennis R. Cohen

    Wiley 2004; US$ 44.99

    Updated to cover the latest program version, this comprehensive guide helps users make the most of FileMaker Pro, the sophisticated workgroup database application with nine million registered users Offers complete step-by-step guidance on FileMaker Pro features and tasks, covering both the Mac and Windows versions Features expanded coverage of ODBC,... more...

  • Semiotics in Information Systems Engineeringby Kecheng Liu

    Cambridge University Press 2000; US$ 52.00

    This book, first published in 2000, covers applications of semiotics to computer system developments, aimed at professionals and academics. more...

  • Black Hat Physical Device Securityby Drew Miller

    Elsevier Science 2005; US$ 53.95

    Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans,... more...

  • Robust Range Image Registration Using Genetic Algorithms and the Surface Interpenetration Measureby Luciano Silva; Olga R. P. Bellon; Kim L. Boyer

    World Scientific Publishing Company 2005; US$ 149.00

    This book addresses the range image registration problem for automatic 3D model construction. The focus is on obtaining highly precise alignments between different view pairs of the same object to avoid 3D model distortions; in contrast to most prior work, the view pairs may exhibit relatively little overlap and need not be prealigned. more...

  • CISSP Training Guideby Roberta Bragg

    Pearson Education 2002; US$ 59.99

    The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography,... more...

  • Novell ZENworks for Desktops 4 Administrator's Handbookby Brad Dayley

    Pearson Education 2003; US$ 31.99

    To help customers reduce the growing cost of managing employee computers both in the office and on the road, Novell created Novell® ZENworks® for Desktops 4. ZENworks stands for Zero Effort Networks. Built to operate over the Internet as well as internal networks, ZENworks for Desktops 4 automates key network management tasks so IT professionals... more...

  • Security+ Certification Exam Cram 2 (Exam Cram SYO-101)by Kirk Hausman; Diane Barrett; Martin Weiss; Ed Tittel

    Pearson Education 2003; US$ 31.99

    A new edition of this title is available, ISBN-10: 078973804X ISBN-13: 9780789738042   The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a need to better train, staff, and empower those tasked with designing and implementing information... more...

  • Beginning Regular Expressionsby Andrew Watt

    Wiley 2005; US$ 57.95

    This book introduces the various parts of the construction of a regular expression pattern, explains what they mean, and walks you through working examples showing how they work and why they do what they do. By working through the examples, you will build your understanding of how to make regular expressions do what you want them to do and avoid creating... more...