The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
- Sky Pony Press 2014; US$ 7.99
Steve is back and ready for more adventures! But this time the excitement lands closer to home. While walking home from the village, Steve is surprised to hear a loud BOOM! When he returns home, he finds his wheat farm destroyed and a huge crater where the wheat once grew. And his diamond sword is missing! Steve believes it?s the act of a griefer... more...
- De Gruyter Oldenbourg 2014; US$ 98.00
Innovative und vernetzte Computertechnologien haben in den letzten Jahren entscheidend dazu beigetragen, dass neue Freiräume für IT-Nutzer geschaffen wurden. Die Fachtagung Mensch & Computer 2014 in München nimmt diese technologischen Entwicklungen zum Anlass, um Beiträge deutschsprachiger Forscher zur Entwicklung von Interaktionskonzepten vorzustellen... more...
- De Gruyter 2014; US$ 182.00
Volume 5 considers the liability of Internet providers, the protection of personal data, and the criminal liability of users and firms. It offers practical explanations of laws pertaining to telemedia, telecommunications, databases, IT security, and media criminal liability. more...
- Wiley 2014; US$ 140.00
Real-time systems are used in a wide range of applications, including control, sensing, multimedia, etc. Scheduling is a central problem for these computing/communication systems since responsible of software execution in a timely manner. This book provides state of knowledge in this domain with special emphasis on the key results obtained within... more...
- Wiley 2014; US$ 145.00
Formal Languages, Automaton and Numeration Systems presents readers with a review of research related to formal language theory, combinatorics on words or numeration systems, such as Words, DLT (Developments in Language Theory), ICALP, MFCS (Mathematical Foundation of Computer Science), Mons Theoretical Computer Science Days, Numeration, CANT (Combinatorics,... more...
- Elsevier Science 2014; US$ 59.95
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low... more...
- Taylor and Francis 2014; US$ 89.95
Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms,... more...
- Taylor and Francis 2014; US$ 99.95
A Versatile Framework for Handling Subdivided Geometric Objects Combinatorial Maps: Efficient Data Structures for Computer Graphics and Image Processing gathers important ideas related to combinatorial maps and explains how the maps are applied in geometric modeling and image processing. It focuses on two subclasses of combinatorial maps: n... more...
- Taylor and Francis 2014; US$ 119.95
In today?s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in... more...