The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
System design; Periodicals

Most popular at the top

  • Digital Content Annotation and Transcodingby Katashi Nagao

    Artech House 2003; US$ 103.00

    Today, as industry professionals are identifying and targeting distinct segments in broadcast and Web audiences, the challenge is to create digital content that can be tailored and personalized to reach these distinct and differing audience segments. Transcoding and annotation are the methods that more and more engineers in the industry are using to... more...

  • Role-Based Access Controlby David Ferraiolo; Richard Kuhn; Ramaswamy Chandramouli

    Artech House 2003; US$ 90.00

    Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer... more...

  • User's Guide tp Crytography and Standards by Alex Dent; Chris Mitchell

    Artech House 2004; US$ 116.00

    With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized... more...

  • Grid Computing for Electromagneticsby Luciano Tarricone; Alessandra Esposito

    Artech House 2004; US$ 150.00

    Today, more and more practitioners, researchers, and students are utilizing the power and efficiency of grid computing for their increasingly complex electromagnetics applications. This cutting-edge book offers you the practical and comprehensive guidance you need to use this new approach to supercomputing for your challenging projects. Supported with... more...

  • Privacy Protection and Computer Forensicsby Michael Caloyannides

    Artech House 2004; US$ 94.00

    This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving Maxwell?s equations. There has been considerable advancement in FDTD computational technology over the... more...

  • CISSP Training Guideby Roberta Bragg

    Pearson Education 2002; US$ 59.99

    The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography,... more...

  • Novell ZENworks for Desktops 4 Administrator's Handbookby Brad Dayley

    Pearson Education 2003; US$ 31.99

    To help customers reduce the growing cost of managing employee computers both in the office and on the road, Novell created Novell® ZENworks® for Desktops 4. ZENworks stands for Zero Effort Networks. Built to operate over the Internet as well as internal networks, ZENworks for Desktops 4 automates key network management tasks so IT professionals... more...

  • Security+ Certification Exam Cram 2 (Exam Cram SYO-101)by Kirk Hausman; Diane Barrett; Martin Weiss; Ed Tittel

    Pearson Education 2003; US$ 31.99

    A new edition of this title is available, ISBN-10: 078973804X ISBN-13: 9780789738042   The Security+ certification is CompTIA's answer to the market's need for a baseline, vendor-neutral security certification. The IT industry recognizes there is a need to better train, staff, and empower those tasked with designing and implementing information... more...

  • Black Hat Physical Device Securityby Drew Miller

    Elsevier Science 2005; US$ 53.95

    Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans,... more...

  • Microsoft® Exchange Server 2003 Deployment and Migrationby Kieran McCorry

    Elsevier Science 2004; US$ 81.95

    Microsoft® Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment. The book discusses the requisite infrastructure requirements of Windows 2000 and Windows 2003. Furthermore, this book covers, in detail, the tools and techniques that messaging... more...