The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- McGraw-Hill Education 2014; US$ 60.00
The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics , Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource... more...
- O'Reilly Media 2012; US$ 50.99
In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long "travelogue" follows a team of Juniper Networks warriors as they solve specific needs with emerging... more...
- Taylor and Francis 2014; US$ 159.95
Providing a unified treatment of cognitive radio networks (CRNs) using the spectrum cycle, this book is the first to discuss the impact of spectrum sharing on the performance of cooperative diversity schemes in a comprehensive manner. Following a bottom-up approach where lower-level changes are reflected in upper-level design and performance, the... more...
- McGraw-Hill Education 2014; US$ 30.00
Don't Let the Real Test Be Your First Test! Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. CompTIA Security+ Certification Practice Exams , Second Edition (Exam SY0-401)... more...
- World Scientific Publishing Company 2006; US$ 176.00
This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail — information processing in a collocated cluster, information transport over a tree... more...
- World Scientific Publishing Company 1998; US$ 132.00
Neuromorphic systems are implementations in silicon of sensory and neural systems whose architecture and design are based on neurobiology. This growing area offers exciting possibilities, such as sensory systems that can compete with human senses and pattern recognition systems that can run in real time. It is at the intersection of neurophysiology,... more...
- World Scientific Publishing Company 2010; US$ 207.00
This book comprehensively studies fuzzy temporal and spatial information, starting from the basics on fuzzy set theory and temporal/spatial reasoning, the development of a new model to represent fuzzy temporal/spatial information, the study of efficient and complete reasoning algorithms, and their application in an information retrieval context. This... more...
- O'Reilly Media 2003; US$ 43.99
While several publishers (including O'Reilly) supply excellent documentation of router features, the trick is knowing when, why, and how to use these features There are often many different ways to solve any given networking problem using Cisco devices, and some solutions are clearly more effective than others. The pressing question for a network... more...
- McGraw-Hill Education 2014; US$ 40.00
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."-- Slashdot Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security... more...