The Leading eBooks Store Online
3,788,875 members ⚫ 1,234,658 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Packt Publishing 2016; US$ 39.99
Bring life to your robot using ROS robotic applications About This Book: This book will help you boost your knowledge of ROS and give you advanced practical experience you can apply to your ROS robot platforms; This is the only book that offers you step-by-step instructions to solidify your ROS understanding and gain experience using ROS tools; From... more...
- Elsevier Science 2016; US$ 54.95
Quantifying the User Experience: Practical Statistics for User Research, Second Edition, provides practitioners and researchers with the information they need to confidently quantify, qualify, and justify their data. The book presents a practical guide on how to use statistics to solve common quantitative problems that arise in user research. It... more...
- IT Governance Ltd 2016; US$ 14.95
Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.2, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing. more...
- McGraw-Hill Education 2016; US$ 50.00
Fully up-to-date coverage of every topic on the CEH v9 certification exam Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH... more...
- CRC Press 2016; US$ 154.95
Soldier-robot teams will be an important component of future battle spaces, creating a complex but potentially more survivable and effective combat force. The complexity of the battlefield of the future presents its own problems. The variety of robotic systems and the almost infinite number of possible military missions create a dilemma for researchers... more...
- Apress 2016; US$ 18.04
Will your next doctor be a human being?or a machine? Will you have a choice? If you do, what should you know before making it? This book introduces the reader to the pitfalls and promises of artificial intelligence (AI) in its modern incarnation and the growing trend of systems to "reach off the Web" into the real world. The convergence of AI, social... more...
- Morgan & Claypool Publishers 2016; US$ 32.00
This book discusses semantic interaction , a user interaction methodology for visual analytic applications that more closely couples the visual reasoning processes of people with the computation. This methodology affords user interaction on visual data representations that are native to the domain of the data. User interaction in visual analytics... more...
- Springer Fachmedien Wiesbaden 2016; US$ 13.38
Mit diesem Buch finden Sie sich schnell im Dschungel der medienspezifischen Rechtsfragen zurecht. Es orientiert sich am Lehrplan und hilft Ihnen, die für Ihren Beruf relevanten Themen schnell zu begreifen und mit ihnen umgehen zu können. Insbesondere liegt der Schwerpunkt auf dem Urheberrecht, dem Kennzeichen- und Markenrecht, dem Internetrecht, dem... more...
- Elsevier Science 2016; US$ 49.95
Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations... more...