The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
System design; Periodicals

Most popular at the top

  • Advanced Database Technology And Designby Mario Piattini; Oscar Díaz

    Artech House 2006; US$ 59.00

    An introduction to developments in database systems design, from an applications point of view. Featuring contributions from experts, it pays special attention to issues raised by new trends in database design, and how these developments affect the programmer and database administrator. more...

  • How to Cheat at Managing Information Securityby Mark Osborne

    Elsevier Science 2006; US$ 41.95

    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all... more...

  • Advances in Intelligent ITby Y. Li; M. Looi; N. Zhong

    IOS Press 2006; US$ 151.00

    In the great digital era, we are witnessing many rapid scientific and technological developments in human-centered, seamless computing environments, interfaces, devices and systems with applications ranging from business and communication to entertainment and learning. These developments are collectively best characterized as Active Media Technology... more...

  • Adaptive Perspectives on Human-Technology Interactionby Alex Kirlik

    Oxford University Press 2006; US$ 39.99

    How to understand and support cognition in human-technology interaction is both a practically and socially relevant problem. The chapters frame this problem in adaptive terms: how are behaviour and cognition adapted, or perhaps ill-adapted, to the demands and opportunities of an environment where interaction is mediated by tools and technology? more...

  • Computer Security and Cryptographyby Alan G. Konheim

    Wiley 2007; US$ 150.00

    ALAN G. KONHEIM , PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models. more...

  • Special Edition Using Microsoft Office Access 2007by Roger Jennings

    Pearson Education 2007; US$ 39.99

    This book offers you comprehensive, information on using the new version of Access. Not only updated for the latest version, new chapters have been added on application automation with Access macros and collaboration with Microsoft SharePoint Team Server, both of which are hot topics.  All chapters are updated for the transition from Jet to the... more...

  • PCI Complianceby Branden R. Williams; Anton Chuvakin; Tony Bradley

    Elsevier Science 2011; US$ 64.95

    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry... more...

  • The Best Damn Server Virtualization Book Periodby Rogier Dittner; Jr. David Rule

    Elsevier Science 2011; US$ 62.95

    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot.... more...

  • Advanced Autonomic Networking and Communicationby Monique Calisti; Sven van der Meer; John Strassner

    Springer 2007; US$ 59.95

    This book presents a comprehensive reference of state-of-the-art efforts and early results in the area of autonomic networking and communication. The essence of autonomic networking, and thus autonomic communications, is to enable the self-governing of services and resources within the constraints of business rules. In order to support self-governance,... more...

  • Database Design for Mere Mortalsby Michael J. Hernandez

    Pearson Education 2003; US$ 59.99

    &a> Database Design for Mere Mortals?, Second Edition, is a straightforward, platform-independent tutorial on the basic principles of relational database design. It provides a commonsense design methodology for developing databases that work. Database design expert Michael J. Hernandez has expanded his best-selling first edition, maintaining its... more...