The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
System design; Periodicals

Most popular at the top

  • Access 2010 For Dummiesby Laurie Ulrich Fuller; Ken Cook

    Wiley 2010; US$ 24.99 US$ 19.99

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies ... more...

  • ISA System Architecture, Third Editionby Tom Shanley; Don Anderson

    Addison-Wesley Longman 1995; US$ 14.95

    The authoritative guide to the ISA specification for internal PC data exchange. ISA System Architecture provides a detailed tutorial on how Intel X86 microprocessors communicate with memory and I/O devices, theory on the operation of RAM and ROM devices, along with implementations commonly used in ISA systems, and detailed discussion of the ISA... more...

  • PCI-X System Architectureby Tom Shanley; Inc. Mindshare

    Addison-Wesley Longman 2001; US$ 19.95

    PCI-X System Architecture is a detailed and comprehensive guide to the PCI-X technology. It highlights the many changes and improvements from PCI 2.2 to PCI-X, so that you can build on your PCI knowledge to master PCI-X with greater ease. The book discusses the drawbacks of PCI and how PCI-X solves these problems to achieve faster transfer rates.... more...

  • PCI System Architecture, Fourth Editionby Tom Shanley; Don Anderson; Inc. Mindshare

    Addison-Wesley Longman 1999; US$ 19.95

    Now in its fourth edition, PCI System Architecture provides a detailed review of the PCI Rev 2.2 spec in an easy to understand manner. It also covers the following specs: 1.1 PCI-to-PCI Bridge Specification, 2.1 PCI BIOS Specification, 1.1 PCI Bus Power Management Interface Specification, and 1.0 PCI Hot-Plug Specification. more...

  • Hack Attacks Revealedby John Chirillo

    Wiley 2002; US$ 59.99

    The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into... more...

  • Quick CORBA 3by Jon Siegel

    Wiley 2002; US$ 39.99

    The latest release of CORBA boasts many new features that were highly anticipated by developers, including all of the necessary services for building fully distributed applications regardless of platform or programming language. Written by a leading international authority on CORBA and the bestselling author of CORBA 3 Fundamentals and Programming,... more...

  • Mission-Critical Security Plannerby Eric Greenberg

    Wiley 2003; US$ 55.00

    Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management... more...

  • IBM Data Warehousingby Michael L. Gonzales

    Wiley 2003; US$ 50.00

    Reviews planning and designing architecture and implementing the data warehouse. Includes discussions on how and why to apply IBM tools. Offers tips, tricks, and workarounds to ensure maximum performance. Companion Web site includes technical notes, product updates, corrections, and links to relevant material and training. more...

  • Mastering SQL Server 2000 Securityby Mike Young; Curtis W. Young

    Wiley 2003; US$ 50.00

    Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable... more...

  • Hack Attacks Deniedby John Chirillo

    Wiley 2001; US$ 54.99

    Once you've seen firsthand in Hack Attacks Revealed all the tools and techniques that hackers use to exploit network security loopholes, you're ready to learn specific methods for protecting all parts of the network against security breaches. Corporate hack master Chirillo shows readers how to develop a security policy that has high alert capability... more...