The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Apress 2012; US$ 41.99
Today's .NET developers are intrigued by what the iPhone and iPad apps landscape has to offer. Admit it: you're one of them. Apple's App Store has hundreds of thousands of apps, and yours can be among them. iPhone and iPad app development using the iOS software development kit is one of the most appealing environments available for mobile technology.... more...
- Springer London 2011; US$ 189.00
The papers in this volume are the refereed papers presented at AI-2011, the Thirty-first SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, held in Cambridge in December 2011 in both the technical and the application streams. They present new and innovative developments and applications, divided into... more...
- Springer 2012; US$ 19.95
Dieses Buch ist f r angehende Fachinformatiker, IT-System-Elektroniker, IT-Systemkaufleute und Informatikkaufleute geschrieben, die kurz vor der Pr fung stehen. Es bietet eine klare, kompakte Anleitung zur Pr fungsvorbereitung: - Detaillierte Informationen ber die Pr fungsanforderungen in IHK-IT-Berufen, f r alle vier Berufsbilder, insbesondere auch... more...
- World Scientific Publishing Company 1997; US$ 133.00
Computers are used in today's technological world as a powerful tool to simulate many complex phenomena in various fields. This book is an introduction to some of these exciting developments. All the articles are written by experts in their respective fields. Each article teaches by example and the book contains case studies in fields as diverse... more...
- Elsevier Science 2015; US$ 49.95
Hacking .NET: Reversing Code Obfuscation provides you with the knowledge and tools necessary to reverse engineer obfuscated .NET applications. The book examines many of the common techniques used by commercial obfuscators and explains, in detail, methods for detecting and circumventing obfuscations ranging from automated tools to manual techniques.... more...
- Wiley 2013; US$ 160.00
Today, huge quantities of digital audiovisual resources are already available – everywhere and at any time – through Web portals, online archives and libraries, and video blogs. One central question with respect to this huge amount of audiovisual data is how they can be used in specific (social, pedagogical, etc.) contexts and what are... more...
- World Scientific Publishing Company 1993; US$ 229.00
The book is a very up-to-date collection of articles in theoretical computer science, written by leading authorities in the field. The topics range from algorithms and complexity to algebraic specifications, and from formal languages and language-theoretic modeling to computational geometry. The material is based on columns and articles that have appeared... more...
- World Scientific Publishing Company 1995; US$ 236.00
The theory of traces employs techniques and tackles problems from quite diverse areas which include formal language theory, combinatorics, graph theory, algebra, logic, and the theory of concurrent systems. In all these areas the theory of traces has led to interesting problems and significant results. It has made an especially big impact in formal... more...
- Elsevier Science 2013; US$ 29.95
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois,... more...