The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
System design; Periodicals

Most popular at the top

  • How to Cheat at Managing Information Securityby Mark Osborne

    Elsevier Science 2006; US$ 41.95

    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all... more...

  • Advances in Intelligent ITby Y. Li; M. Looi; N. Zhong

    IOS Press 2006; US$ 151.00

    In the great digital era, we are witnessing many rapid scientific and technological developments in human-centered, seamless computing environments, interfaces, devices and systems with applications ranging from business and communication to entertainment and learning. These developments are collectively best characterized as Active Media Technology... more...

  • Adaptive Perspectives on Human-Technology Interactionby Alex Kirlik

    Oxford University Press 2006; US$ 39.99

    How to understand and support cognition in human-technology interaction is both a practically and socially relevant problem. The chapters frame this problem in adaptive terms: how are behaviour and cognition adapted, or perhaps ill-adapted, to the demands and opportunities of an environment where interaction is mediated by tools and technology? more...

  • Computer Security and Cryptographyby Alan G. Konheim

    Wiley 2007; US$ 150.00

    ALAN G. KONHEIM , PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models. more...

  • Special Edition Using Microsoft Office Access 2007by Roger Jennings

    Pearson Education 2007; US$ 39.99

    This book offers you comprehensive, information on using the new version of Access. Not only updated for the latest version, new chapters have been added on application automation with Access macros and collaboration with Microsoft SharePoint Team Server, both of which are hot topics.  All chapters are updated for the transition from Jet to the... more...

  • Hands-On Oracle Database 10g Express Edition for Windowsby Steve Bobrowski

    McGraw-Hill Education 2010; US$ 49.99

    Steve Bobrowski (Chapel Hill, NC) is the founder and CEO of the Oracle training and consulting company All Database Domain (www.dbdomain.com). Steve is a former Oracle employee where he worked on the development of the database product and as a documentation writer. Steve has written for many industry publications and is the author of Oracle8i for... more...

  • PCI Complianceby Branden R. Williams; Anton Chuvakin; Tony Bradley

    Elsevier Science 2011; US$ 64.95

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry... more...

  • The Best Damn Server Virtualization Book Periodby Rogier Dittner; Jr. David Rule

    Elsevier Science 2011; US$ 62.95

    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot.... more...

  • Gray Hat Hacking, Second Editionby Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness

    McGraw-Hill Education 2008; US$ 49.99

    "A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker more...

  • Database Design for Mere Mortalsby Michael J. Hernandez

    Pearson Education 2003; US$ 59.99

    &a> Database Design for Mere Mortals?, Second Edition, is a straightforward, platform-independent tutorial on the basic principles of relational database design. It provides a commonsense design methodology for developing databases that work. Database design expert Michael J. Hernandez has expanded his best-selling first edition, maintaining its... more...