The Leading eBooks Store Online

3,508,729 members ⚫ 2,065,349 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Computer Science

  • Pervasive Communications Handbookby Syed Ijlal Ali Shah; Mohammad Ilyas; Hussein T. Mouftah

    CRC Press 2016; US$ 159.95

    In an emergency, availability of the pervasive communications environment could mean the difference between life and death. Possibly one of the first guides to comprehensively explore these futuristic omnipresent communications networks, the Pervasive Communications Handbook addresses current technology (i.e., MAC protocols and P2P-based VoD architecture)... more...

  • Information Securityby Timothy P. Layton

    CRC Press 2016; US$ 121.95

    Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately,... more...

  • Complete Guide to CISM Certificationby Thomas R. Peltier; Justin Peltier

    CRC Press 2016; US$ 109.95

    The Certified Information Security Manager (CISM ) certification program was developed by the Information Systems Audit and Controls Association (ISACA ). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM Certification... more...

  • Official (ISC)2 Guide to the CISSP CBKby Steven CISSP Hernandez

    CRC Press 2016; US$ 73.95

    The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC) 2 created the information security industry?s first and only CBK , a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as... more...

  • Interactive Dynamic-System Simulation, Second Editionby Granino A. Korn

    CRC Press 2016; US$ 109.95

    A hands-on tutorial, covering interactive simulation of dynamical systems such as aerospace vehicles, power plants, chemical processes, control systems, and physiological systems. In practice, simulation experiments are employed for iterative decision-making, whereby programs are run, modified, and run again and again. It is very important to emphasize... more...

  • Introduction to Contextual Processingby Gregory Vert; S. Sitharama Iyengar; Vir V. Phoha

    CRC Press 2016; US$ 119.95

    Develops a Comprehensive, Global Model for Contextually Based Processing Systems A new perspective on global information systems operation Helping to advance a valuable paradigm shift in the next generation and processing of knowledge, Introduction to Contextual Processing: Theory and Applications provides a comprehensive model for constructing... more...

  • Cyber Security Essentialsby James Graham; Ryan Olson; Rick Howard

    CRC Press 2016; US$ 72.95

    The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish... more...

  • Human-Computer Etiquetteby Caroline C. Hayes; Christopher A. Miller

    CRC Press 2016; US$ 92.95

    Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces.... more...

  • Understanding Mathematical Proofby John Taylor; Rowan Garnier

    CRC Press 2016; US$ 61.95

    The notion of proof is central to mathematics yet it is one of the most difficult aspects of the subject to teach and master. In particular, undergraduate mathematics students often experience difficulties in understanding and constructing proofs. Understanding Mathematical Proof describes the nature of mathematical proof, explores the various... more...

  • Fundamental Mechanics of Fluids, Fourth Editionby I.G. Currie

    CRC Press 2016; US$ 129.95

    Fundamental Mechanics of Fluids, Fourth Edition addresses the need for an introductory text that focuses on the basics of fluid mechanics?before concentrating on specialized areas such as ideal-fluid flow and boundary-layer theory. Filling that void for both students and professionals working in different branches of engineering, this versatile... more...