The Leading eBooks Store Online
3,508,729 members ⚫ 2,065,349 ebooks
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Springer Berlin Heidelberg 2008; US$ 99.00
Researchers and professionals will find in this text the thoroughly refereed post-proceedings of the Third International Conference on the Quality of Software Architectures, QoSA 2007, held in Medford, MA, USA, in 2007. It was mounted in conjunction with the 10th International ACM SIGSOFT Symposium on Component-Based Software Engineering, CBSE 2007.... more...
- Springer Berlin Heidelberg 2007; US$ 99.00
This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC 2006, held in Lucca, Italy, in November 2006. The 14 revised papers presented together with two keynote lectures were carefully reviewed and selected from 32 submissions. The book starts off with activity reviews of four FP6... more...
- Springer US 2010; US$ 149.00
This book contains extended and revised versions of the best papers that were presented during the fourteenth edition of the IFIP TC10/WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 14th conference was held at the Hotel Boscolo, Nice, France (October 16-18, 2006). Previous conferences... more...
- Springer US 2008; US$ 249.00
The objective of this book is to provide timely and comprehensive coverage of the principles, technology, practice, and future of tra?c grooming in op- cal networks. Tra?c grooming considerations are already shaping new switch designs and standards, including next generation Synchronous Optical N- work/Synchronous Digital Hierarchy (SONET/SDH) and... more...
- O'Reilly Media 2001; US$ 39.99
Over the years, thousands of tools have been developed for debugging TCP/IP networks. They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. Even better, many of them are absolutely free. There's only one problem: who has time to track them all down,... more...
- Springer Berlin Heidelberg 2009; US$ 199.00
This book constitutes the proceedings of two conferences: The 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2009) and the 3rd International ICST Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications (AAA-IDWEA 2009).QShine is a very successfull... more...
- Springer Berlin Heidelberg 2010; Not Available
Mit seiner Jahrestagung 2009 bietet der GI/GMA-Fachauschuss Echtzeitsysteme (real-time) Wissenschaftlern, Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen aus dem Bereich ?Software-intensive verteilte Echtzeitsysteme" vorgestellt werden. Abgedeckt werden folgende Themenbereiche: Methoden/Standards, Engineering/Werkzeuge,... more...
- O'Reilly Media 2005; US$ 27.99
As an open operating system, Unix can be improved on by anyone and everyone: individuals, companies, universities, and more. As a result, the very nature of Unix has been altered over the years by numerous extensions formulated in an assortment of versions. Today, Unix encompasses everything from Sun's Solaris to Apple's Mac OS X and more varieties... more...
- Elsevier Science 2010; US$ 26.95
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. The book consists of seven chapters that deal with the following attacks: (i) denial of service; (ii) war dialing; (iii) penetration... more...
- Springer US 2007; US$ 229.00
Collaborative networks in action Collaborative Networks (CN) is a fast developing area, as shown by the already large number of diverse real-world implemented cases and the dynamism of its related involved research community. Benefiting from contributions of multiple areas, namely computer science, computer engineering, communications and networking,... more...