Wiley / Computers

New Releases

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Publisher

Delete Wiley

 

Category

Delete Computers

 

In category

Personal Computing (88)

Programming (57)

Hardware and devices (49)

Graphism (48)

Web (47)

Database (36)

System Administration (34)

Enterprise software and computing (30)

Audio, Vidéo (9)

Computer Architecture (1)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (424)

French (0)

German (0)

Spanish (0)

Italian (0)

 

Protection

All (424)

DRM Free (0)

DRM (424)

More options

Combinatorics: An Introduction

by Theodore G. Faticoni

Bridges combinatorics and probability and uniquely includes detailed formulas and proofs to promote mathematical thinking

Combinatorics: An Introduction introduces readers to counting combinatorics, offers examples...


AutoCAD 2015 and AutoCAD LT 2015 Bible

by Ellen Finkelstein

The perfect reference for all AutoCAD users

AutoCAD 2015 and AutoCAD LT 2015 Bible is the book you want to have close at hand to answer those day-to-day questions about this industry-leading software. Author...


Combining Pattern Classifiers: Methods and Algorithms

by Ludmila I. Kuncheva

Combined classifiers, which are central to the ubiquitous performance of pattern recognition and machine learning, are generally considered more accurate than single classifiers. In a didactic, detailed assessment,...


About Face: The Essentials of Interaction Design

by Alan Cooper, Robert Reimann & David Cronin

The essential interaction design guide, fully revised and updated for the mobile age

About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved...


Exploring LEGO Mindstorms EV3: Tools and Techniques for Building and Programming Robots

by Eun Jung Park

The essential guide to building and programming LEGO EV3 interactive robots

Exploring LEGO Mindstorms: Tools and Techniques for Building and Programming Robots is the complete guide to getting the most out of...


The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

by Michael Hale Ligh, Andrew Case & Jamie Levy

Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller...


101 Ready-to-Use Excel Formulas

by Michael Alexander & Dick Kusleika

Mr. Spreadsheet has done it again with 101 easy-to-apply Excel formulas

101 Ready-to-Use Excel Formulas is filled with the most commonly-used, real-world Excel formulas that can be repurposed and put into action,...


Google BigQuery Analytics

by Jordan Tigani & Siddartha Naidu

How to effectively use BigQuery, avoid common mistakes, and execute sophisticated queries against large datasets

Google BigQuery Analytics is the perfect guide for business and data analysts who want the latest...


Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners

by Jared Dean

With big data analytics comes big insights into profitability

Big data is big business. But having the data and the computational power to process it isn't nearly enough to produce meaningful results. Big Data,...


Wavelet Neural Networks: With Applications in Financial Engineering, Chaos, and Classification

by Antonios K. Alexandridis & Achilleas D. Zapranis

Through extensive examples and case studies, Wavelet Neural Networks provides a step-by-step introduction to modeling, training, and forecasting using wavelet networks. The acclaimed authors present a statistical...


Xcode 5 Developer Reference

by Richard Wentk

Design, code, and build amazing apps with Xcode 5

Thanks to Apple's awesome Xcode development environment, you can create the next big app for Macs, iPhones, iPads, or iPod touches. Xcode 5 contains gigabytes...


Android Hacker's Handbook

by Joshua J. Drake, Zach Lanier & Collin Mulliner

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing...


Attack and Defend Computer Security Set

by Dafydd Stuttard, Marcus Pinto & Michael Hale Ligh

Defend your networks and data from attack with this unique two-book security set

The Attack and Defend Computer Security Set is a two-book set comprised of the bestselling second edition of Web Application Hacker’s...


Premiere Pro CC Digital Classroom

by Jerron Smith & AGI Creative Team

A Complete Training Package!

Full-color, step-by-step instructional book

Video training from expert instructors

Tutorials and lesson files on companion DVD

You have a personal tutor in the Digital Classroom

If you...


Business Transformation: A Roadmap for Maximizing Organizational Insights

by Aiman Zeid & Jim Davis

Effectively introduce and promote analytics within your enterprise

All companies use information to set strategies and accomplish business objectives. But how many CEOs and CIOs would say they are satisfied that...


Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

by Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches...


Versatile Routing and Services with BGP: Understanding and Implementing BGP in SR-OS

by Alcatel-Lucent & Colin Bookham

Design a robust BGP control plane within a secure, scalable network for smoother services

A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization....


Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)

by Michael J. Kavis

An expert guide to selecting the right cloud service model for your business

Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients....


Unmasking the Social Engineer: The Human Element of Security

by Christopher Hadnagy & Paul Ekman

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge...


Data-Driven Security: Analysis, Visualization and Dashboards

by Jay Jacobs & Bob Rudis

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This...