The Leading eBooks Store Online
3,693,353 members ⚫ 1,195,028 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Springer International Publishing 2014; US$ 62.05
This book constitutes the thoroughly refereed proceedings of the Third International Multi-topic Conference on Communications, Technologies, Information Security and Sustainable Development, IMTIC 2013, held in Jamshoro, Pakistan, in December 2013. The 27 revised papers presented in this volume were carefully reviewed and selected from 140 submissions.... more...
- Springer International Publishing 2015; US$ 54.43
This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015. The 13 full papers presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to... more...
- Springer International Publishing 2014; US$ 54.43
Wireless networks of moving objects have drawn significant attention recently. These types of networks consist of a number of autonomous or semi-autonomous wireless nodes/objects moving with diverse patterns and speeds while communicating via several radio interfaces simultaneously. To overcome current shortcomings, a number of research challenges... more...
- Apress 2015; US$ 21.76
Learn how routersnetwork using the OSPF (Open Shortest Path First) protocol and unpickDijkstra?s Network Algorithm to see how OSPF performs the calculations todetermine the shortest or most appropriate path between two routers. OSPF: ANetwork Routing Protocol dives deep into the OSPF protocol withoutsacrificing simplicity in language. All of this... more...
- Apress 2015; US$ 35.92
Program the Internet of Things with Swift and iOS is a detailed tutorial that will teach you how to build apps using Apple?s native APIs for the Internet of Things, including the Apple Watch, HomeKit, and Apple Pay. This is the second book by Ahmed Bakir (author of Beginning iOS Media App Development ) and his team at devAtelier LLC, who have been... more...
- Packt Publishing 2016; US$ 35.99
Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques About This Book: Design and build an extendable penetration testing lab with wireless access suitable for home and enterprise use; Fill the lab with various components and customize them according to your own needs and skill level; Secure your... more...
- Springer International Publishing 2016; US$ 79.47
This bookconstitutes the refereed proceedings of the 6th International Conference onSupercomputing, ISUM 2015, held in México, Mexico, in March 2015. The 38revised full papers presented were carefully reviewed and selected from 102submissions. The papers are organized in topical sections on perspectives insupercomputer infrastructure and applications;... more...
- Packt Publishing 2016; US$ 35.99
Gain essential knowledge and keep your NetScaler environment in top form About This Book: Learn how the main features - Load Balancing, Content Switching, GSLB, SSL offloading, AAA, AppFirewall, and Gateway work under the hood using vividly explained flows and traces; Explore the NetScaler layout and the various logs, tools and methods available to... more...
- Apress 2016; US$ 44.04
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something... more...
- Elsevier Science 2016; US$ 130.00
Cyber-Physical Systems: Foundations, Principles and Applications explores the core system science perspective needed to design and build complex cyber-physical systems. Using Systems Science?s underlying theories, such as probability theory, decision theory, game theory, organizational sociology, behavioral economics, and cognitive psychology, the... more...