The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- McGraw-Hill Education 2015; US$ 65.00
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves... more...
- McGraw-Hill Education 2015; US$ 90.00
This Oracle Press certification exam guide prepares you for the new Oracle Database 12 c certification track, including the core requirements for OCA and OCP certification. OCA/OCP Oracle Database 12c All-in-One Exam Guide (Exams 1Z0-061, 1Z0-062, & 1Z0-063) covers all of the exam objectives on the Installation and Administration, SQL Fundamentals,... more...
- Edward Elgar Publishing 2015; US$ 40.00
Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud computing, such as personal data privacy, security and intellectual property protection. Leading international academics and practitioners in the fields of law and computer science examine the specific... more...
- Elsevier Science 2015; US$ 105.00
Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks. Future networks are expected to be autonomous, scalable and adaptive.... more...
- CRC Press 2015; US$ 99.95
Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. Information Systems: What Every Business Student Needs to Know takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways" that... more...
- CRC Press 2015; US$ 89.95
The term "smart city" defines the new urban environment, one that is designed for performance through information and communication technologies. Given that the majority of people across the world will live in urban environments within the next few decades, it's not surprising that massive effort and investment is being placed into efforts to develop... more...
- Elsevier Science 2015; US$ 79.95
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is... more...
- Wiley 2015; US$ 59.99
Get up to speed on the latest Group Policy tools, features, and best practices Group Policy , Fundamentals, Security, and the Managed Desktop, 3rd Edition help s you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10 and Windows Server vNext, bringing you... more...
- O'Reilly Media 2015; US$ 31.99
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you?re part of a team creating applications for Internet-connected... more...