The Leading eBooks Store Online
3,603,993 members ⚫ 1,165,375 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Elsevier Science 2002; US$ 51.95
Introducing Microsoft's flagship wireless development tool The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on... more...
- Apress 2014; US$ 29.99
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and... more...
- Helion 2007; US$ 15.00
Praktyczny przewodnik po technikach zabezpieczania sieci komputerowych Jak sprawnie zabezpieczy? system? Jak zapewni? sobie prywatno?? w internecie? Jak skutecznie walczy? z sieciowymi w?amywaczami? W naszych domach montujemy solidne zamki i drzwi, chronimy samochody wymy?lnymi alarmami, w firmach zak?adamy systemy monitoringu,... more...
- IT Governance Ltd 2012; US$ 150.00
This book is the first to gather the salient information regarding the use of cyber warfare doctrine by the People?s Republic of China to promote its own hegemonistic, national self-interests and enforce its political, military and economic will on other nation states. more...
- McGraw-Hill Education 2009; US$ 55.00 US$ 45.10
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years... more...
- Wiley 2015; US$ 25.00 US$ 17.50
Be present, connect more effectively, all while being as productive as possible 5 Gears: How to Be Present and Productive When There Is Never Enough Time teaches you to shift into the right gear at the right time so that you can grow in your relational intelligence and increase your influence. This revolutionary text introduces you to the five different... more...
- CRC Press 2012; US$ 54.95
The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies?ranging from Aesop?s fables, athletics, architecture, biology, nursery rhymes, and video games?to illustrate the qualities that are essential for the development of highly secure... more...
- Springer London 2010; US$ 159.00
This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating how to configure equipment in order to implement various network solutions. The text is supported by examples and detailed instructions. more...
- CRC Press 2006; US$ 94.95
Port-based authentication is a ?network access control? concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today.... more...