The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- De Gruyter Oldenbourg 2014; US$ 98.00
Innovative und vernetzte Computertechnologien haben in den letzten Jahren entscheidend dazu beigetragen, dass neue Freiräume für IT-Nutzer geschaffen wurden. Die Fachtagung Mensch & Computer 2014 in München nimmt diese technologischen Entwicklungen zum Anlass, um Beiträge deutschsprachiger Forscher zur Entwicklung von Interaktionskonzepten vorzustellen... more...
- De Gruyter 2014; US$ 182.00
Volume 5 considers the liability of Internet providers, the protection of personal data, and the criminal liability of users and firms. It offers practical explanations of laws pertaining to telemedia, telecommunications, databases, IT security, and media criminal liability. more...
- Taylor and Francis 2014; US$ 99.95
A Versatile Framework for Handling Subdivided Geometric Objects Combinatorial Maps: Efficient Data Structures for Computer Graphics and Image Processing gathers important ideas related to combinatorial maps and explains how the maps are applied in geometric modeling and image processing. It focuses on two subclasses of combinatorial maps: n... more...
- Taylor and Francis 2014; US$ 119.95
In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...
- Taylor and Francis 2014; US$ 149.95
This second edition of a bestseller presents systematic and extensive coverage of the primary areas of research and development within VE technology. It brings together a comprehensive set of contributed articles that address the principles required to define system requirements and design, build, evaluate, implement, and manage the effective use... more...
- Wiley 2014; US$ 54.99
Learn to take advantage of the opportunities offered by SQL Server 2014 Microsoft's SQL Server 2014 update means big changes for database administrators, and you need to get up to speed quickly because your methods, workflow, and favorite techniques will be different from here on out. The update's enhanced support of large-scale enterprise databases... more...
- Springer 2014; US$ 54.99
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors... more...
- Springer 2014; US$ 259.00
The prediction of behavior of complex systems, analysis and modeling of its structure is a vitally important problem in engineering, economy and generally in science today. Examples of such systems can be seen in the world around us (including our bodies) and of course in almost every scientific discipline including such ?exotic? domains as the earth?s... more...
- Wiley 2014; US$ 115.00
Simulation is the art of using tools – physical or conceptual models, or computer hardware and software, to attempt to create the illusion of reality. The discipline has in recent years expanded to include the modelling of systems that rely on human factors and therefore possess a large proportion of uncertainty, such as social, economic or commercial... more...
- Elsevier Science 2014; US$ 59.95
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low... more...