The Leading eBooks Store Online
for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...
New to eBooks.com?Learn more
- Bestsellers - This Week
- Foreign Language Study
- Bestsellers - Last 6 months
- Graphic Books
- Health & Fitness
- Political Science
- Biography & Autobiography
- Psychology & Psychiatry
- Body Mind & Spirit
- House & Home
- Business & Economics
- Children's & Young Adult Fiction
- Juvenile Nonfiction
- Language Arts & Disciplines
- Crafts & Hobbies
- Science Fiction
- Current Events
- Literary Collections
- Literary Criticism
- Literary Fiction
- Social Science
- The Environment
- Sports & Recreation
- Family & Relationships
- Study Aids
- Folklore & Mythology
- Food and Wine
- Performing Arts
- True Crime
- Foreign Language Books
Most popular at the top
- Springer New York 2011; US$ 39.95
Voice over IP Security examines the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. The text also identifies current areas of risk and deficiencies in the research. more...
- Vieweg+Teubner Verlag 2010; US$ 79.99
Mit einem Geleitwort von Prof. Dr. Dr. h.c. Manfred Broy more...
- Springer Milan 2011; US$ 29.95
Dalle origini a oggi, i videogiochi hanno dimostrato di aver acquisito una forte identità espressiva, delineando nuove forme di comunicazione e proponendo l?accesso a nuovi tipi di competenze legate alla sfera digitale dei New Media. L?evoluzione di questo prodotto dell?era dei computer è giunta al culmine: non si parla più di un tipo di gioco ma... more...
- CRC Press 2011; US$ 99.95
In machine learning applications, practitioners must take into account the cost associated with the algorithm. These costs include: Cost of acquiring training data Cost of data annotation/labeling and cleaning Computational cost for model fitting, validation, and testing Cost of collecting features/attributes for test data Cost of user feedback... more...
- Morgan & Claypool Publishers 2011; US$ 40.00
Link reversal is a versatile algorithm design technique that has been used in numerous distributed algorithms for a variety of problems. The common thread in these algorithms is that the distributed system is viewed as a graph, with vertices representing the computing nodes and edges representing some other feature of the system (for instance, point-to-point... more...
- Springer Berlin Heidelberg 2009; US$ 49.95
After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners. more...
- Springer Berlin Heidelberg 2012; US$ 169.00
"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient... more...