The Leading eBooks Store Online
3,687,217 members ⚫ 1,190,073 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Taylor and Francis 2015; US$ 49.95
The software industry has undergone rapid development since the beginning of the twenty-first century. These changes have had a profound impact on translators who, due to the evolving nature of digital content, are under increasing pressure to adapt their ways of working. Localizing Apps looks at these challenges by focusing on the localization... more...
- Morgan & Claypool Publishers 2015; US$ 44.00
Having hit power limitations to even more aggressive out-of-order execution in processor cores, many architects in the past decade have turned to single-instruction-multiple-data (SIMD) execution to increase single-threaded performance. SIMD execution, or having a single instruction drive execution of an identical operation on multiple data items,... more...
- Apress 2015; US$ 49.99
Pro Vagrant teaches you how to effectively implement and optimize Vagrant in your everyday work environment. Master the creation and configuration of virtual development environments with an easy-to-use workflow, and focus on automation. Vagrant lowers development environment setup time, increases development/production parity, and makes the "works... more...
- Springer International Publishing 2014; US$ 47.26
The increasing penetration of IT in organizations calls for an integrative perspective on enterprises and their supporting information systems. MERODE offers an intuitive and practical approach to enterprise modelling and using these models as core for building enterprise information systems. From a business analyst perspective, benefits of the approach... more...
- Springer Berlin Heidelberg 2013; US$ 36.95
Das Arbeitsbuch Wirtschaftsinformatik bildet eine begleitende Lernhilfe zum Lehrbuch "Einführung in die Wirtschaftsinformatik" desselben Verfassers. Der Lehrstoff wird in Form von Fragen und Aufgaben mit zugehörigen Antworten und Musterlösungen behandelt. Die Kapiteleinteilung stimmt mit der des Lehrbuchs in der Reihenfolge Computer-Hardware, Systembetrieb,... more...
- Springer International Publishing 2015; US$ 38.46
This book constitutes the thoroughly refereed and revised selected papers from the 10th International Workshop on Agents and Data Mining Interactions, ADMI 2014, held in Paris, France, in May 2014 as satellite workshop of AAMAS 2014, the 13th International Conference on Autonomous Agents and Multiagent Systems. The 11 papers presented were carefully... more...
- Springer Berlin Heidelberg 2015; US$ 47.26
The Internet of Things, cloud computing, connected vehicles, Big Data, analytics ? what does this have to do with the automotive industry? This book provides information about the future of mobility trends resulting from digitisation, connectedness, personalisation and data insights. The automotive industry is on the verge of undergoing... more...
- Springer International Publishing 2015; US$ 76.94
The four LNCS volume set 9175-9178 constitutes the refereed proceedings of the 9th International Conference on Learning and Collaboration Technologies, UAHCI 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, in Los Angeles, CA, USA in August 2015, jointly with 15 other thematically similar conferences.... more...
- Springer New York 2015; US$ 47.26
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication.... more...