The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Information Technology

Most popular at the top

  • The Basics of Hacking and Penetration Testingby Patrick Engebretson

    Elsevier Science 2013; US$ 29.95

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois,... more...

  • Boolesche Algebra und Computerby Gerd Harbeck; Karl-Heinrich Jäschke

    Vieweg+Teubner Verlag 2013; US$ 49.95

    1. Modelle der Booleschen Algebra.- 1.1. Aussageformen.- 1.2. Logische Verknüpfungen.- 1.3. Erstes Modell: Aussagenalgebra.- 1.4. Zweites Modell: Schaltalgebra.- 1.5. Terme und ihre Verknüpfungen.- 1.6. Gesetze der Booleschen Algebra.- 1.7. Dualität der Gesetze.- 1.8. Adjunktive Normalform.- 1.9. Anwendungen.- 2. Aufbau eines einfachen Computers.-... more...

  • IT Governance Bibliographyby Safari Content Team

    Safari Books Online 2013; US$ 0.00

    IT Governance is the control of organizational structures through effective leadership and the hands-on management of organizational policies, processes, and structures that impact information, information-related assets and technology. Fundamentally, IT governance provides guidance to ensure that an information technology organization is performing... more...

  • IT Service Management Tutorialby Safari Content Team

    Safari Books Online 2013; US$ 0.00

    This is a guide to IT Service Management (ITSM) using the IT Infrastructure Library (ITIL) approach. It is aimed at both technical and non-technical IT management professionals and contains a combination of management, procedural and technical information on implementing ITSM. Upon completion of this tutorial, and by accessing the resources in Safari... more...

  • Empirical Inferenceby Bernhard Schölkopf; Zhiyuan Luo; Vladimir Vovk

    Springer 2013; US$ 129.00

    This book honours the outstanding contributions of Vladimir Vapnik, a rare example of a scientist for whom the following statements hold true simultaneously: his work led to the inception of a new field of research, the theory of statistical learning and empirical inference; he has lived to see the field blossom; and he is still as active as ever. more...

  • PrestaShop Module Developmentby Fabien Serny

    Packt Publishing 2014; US$ 29.99

    If you are a developer who is new to PrestaShop and wants to get a good foundation in development on the PrestaShop framework, this book is for you. It's assumed that you will have some experience with PHP5, jQuery, and HTML/CSS (no need to be an expert on it). more...

  • Mastering Metasploitby Nipun Jaswal

    Packt Publishing 2014; US$ 29.99

    A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers of this book must have a basic knowledge... more...

  • Revision Notes: CCEA ICT for GCSEby Siobhan Matthewson; Gerry Lynch

    Hodder Education 2012; Not Available

    Revision Notes: CCEA ICT for GCSE has been written by experienced teachers and examiners so that you can be confident that it covers only the facts and ideas you will be expected to recall and use in the exam. - Essential facts are carefully organised to make revising easier. - Exams tips show you how to avoid losing marks and get the best grade.... more...

  • Formal Models, Languages and Applicationsby K. G. Subramanian; K. Rangarajan; Madhavan Mukund

    World Scientific Publishing Company 2006; US$ 220.00

    A collection of articles by leading experts in theoretical computer science, this volume commemorates the 75th birthday of Professor Rani Siromoney, one of the pioneers in the field in India. The articles span the vast range of areas that Professor Siromoney has worked in or influenced, including grammar systems, picture languages and new models of... more...