The Leading eBooks Store Online

4,293,432 members ⚫ 1,430,845 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Networking

Most popular at the top

  • Surviving Cyberwarby Richard Stiennon

    Government Institutes 2010; US$ 47.50

    This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines... more...

  • CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guideby Charles L. Brooks

    McGraw-Hill Education 2014; US$ 50.00

    An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative... more...

  • Linux Firewallsby Steve Suehring

    Pearson Education 2015; US$ 39.99

    The Definitive Guide to Building Firewalls with Linux   As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux ® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive... more...

  • Smartphone Energy Consumptionby Sasu Tarkoma; Matti Siekkinen; Eemil Lagerspetz; Yu Xiao

    Cambridge University Press 2014; US$ 63.00

    Get the key measurement, modeling, and analytical tools for developing energy-aware and efficient systems and applications with this practical guide. more...

  • MPLS and VPN Architecturesby Ivan Pepelnjak; Jim Guichard

    Pearson Education 2000; US$ 68.00

    A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousands of VPNs Extensive case studies guide... more...

  • Getting Started with the Photonby Simon Monk

    Maker Media, Inc 2015; US$ 9.99

    The Photon is an open source, inexpensive, programmable, WiFi-enabled module for building connected projects and prototypes. Powered by an ARM Cortex-M3 microcontroller and a Broadcom WiFi chip, the Photon is just as happy plugged into a hobbyist's breadboard as it is into a product rolling off of an assembly line. While the Photon--and its accompanying... more...

  • Filtering and System Identificationby Michel Verhaegen; Vincent Verdult

    Cambridge University Press 2007; US$ 50.00

    This 2007 book discusses the design of reliable numerical methods to retrieve missing information in models of complex systems. more...

  • SSH, The Secure Shell: The Definitive Guideby Daniel J. Barrett; Richard E. Silverman; Robert G. Byrnes

    O'Reilly Media 2005; US$ 35.99

    Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every... more...

  • Programming Web Services with SOAPby James Snell; Doug Tidwell; Pavel Kulchenko

    O'Reilly Media 2001; US$ 27.99

    The web services architecture provides a new way to think about and implement application-to-application integration and interoperability that makes the development platform irrelevant. Two applications, regardless of operating system, programming language, or any other technical implementation detail, communicate using XML messages over open Internet... more...

  • Absolute Beginner's Guide to Networkingby Joe Habraken

    Pearson Education 2003; US$ 27.99

    Absolute Beginner's Guide to Networking, Fourth Edition gives readers the ability and understanding necessary to create and administer a network. The book shows the reader how to physically connect computers and other devices to a network and access peripherals such as printers over the network. Readers will also be able to configure computers... more...