The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- McGraw-Hill Education 2014; US$ 60.00
Master Oracle Mobile Application Framework In Oracle Mobile Application Framework Developer Guide , Oracle ACE Luc Bors explains how to use this powerful tool to create multiplatform mobile apps based on a single code base. Detailed examples and ready-to-use code are provided throughout the book. A complete, step-by-step sample application highlights... more...
- Apple Academic Press 2014; US$ 149.95
This is volume 2 of the two-volume Soft Computing and Its Applications . This volume discusses several advanced features of soft computing and hybrid methodologies. This new book essentially contains the advanced features of soft computing and different hybrid methodologies for soft computing. The book contains an abundance of examples and detailed... more...
- O'Reilly Media 2014; US$ 25.99
Learn how to apply test-driven development (TDD) to machine-learning algorithms?and catch mistakes that could sink your analysis. In this practical guide, author Matthew Kirk takes you through the principles of TDD and machine learning, and shows you how to apply TDD to several machine-learning algorithms, including Naive Bayesian classifiers and... more...
- O'Reilly Media 2014; US$ 19.99
High-precision location information is increasingly useful for mobile application developers, since it allows devices to interact with the world around them. This practical book shows you how to achieve arm?s reach accuracy with iBeacons, simple transmitters that enable your applications to react to nearby surroundings and then deliver timely, relevant... more...
- Packt Publishing 2014; US$ 29.99
If you are a LiveCode mobile developer looking to improve your existing skills, add efficiencies to your code, or want a better understanding of LiveCodes capabilities, then LiveCode Mobile Development Cookbook is a must-have for you. The reader should at least have a basic understanding of LiveCode and mobile application development. more...
- Apple Academic Press 2014; US$ 149.95
This is volume 1 of the two-volume set Soft Computing and Its Applications . This volume explains the primary tools of soft computing as well as provides an abundance of working examples and detailed design studies. The book starts with coverage of fuzzy sets and fuzzy logic and their various approaches to fuzzy reasoning. Precisely speaking, this... more...
- Taylor and Francis 2014; US$ 119.95
In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...
- Wiley 2014; US$ 19.99
Get the most out of your HTC One (M8) smartphone HTC One (M8) For Dummies is a practical user's guide to the HTC One (M8) device, covering a range of pragmatic and how-to topics, from the most useful features and tricks of the core applications to techniques to get the most out of your smartphone. Approaching the capabilities of the HTC One (M8)... more...
- Springer 2014; US$ 54.99
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power that cannot be deployed consistently. The authors... more...
- Springer 2014; US$ 349.00
In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is the next revolution, which the society will perceive... more...