New Releases

icon Subscribe to feed


Best Selling

New Releases




Delete Computers


In category

Programming (3038)

Personal Computing (1881)

Web (1663)

Database (1011)

Graphism (727)

Enterprise software and computing (649)

System Administration (590)

Audio, Vidéo (535)

Hardware and devices (409)

Network and Telecommunications (152)

Computer Architecture (78)

Theory (1)



English (11471)

French (584)

German (1310)

Spanish (162)

Italian (613)



All (11471)

DRM Free (1520)

DRM (9951)

More options

Cultivating a Creative Culture

by Dauer Justin

We create human-centered interactions and experiences in our eld. Empathetic purpose drives our every decision. Mobile First? In reality, it’s humans first. This same mentality, turned inward, forms the cornerstone...

Welcome to Tomorrow

by Corey Preston & Shari Angel

Welcome to Tomorrow: A Beginner’s Guide to Technology brings clarity to the chaotic three-ring-circus of technology launching our present into the future. For those who are inexperienced to curious, the book...

Russian Cyber Attack - Grizzly Steppe Report & The Rules of Cyber Warfare

by U.S. Department of Defense, Department of Homeland Security, Federal Bureau of Investigation & Strategic Studies Institute et al.

Cyber attacks are a real threat to our country. This report presents the opposed views of USA and Russia on cyber security and gives insight into the activities of the Russian civilian and military intelligence...

International Conflicts in Cyberspace - Battlefield of the 21st Century

by U.S. Department of Defense, Strategic Studies Institute, United States Army War College & Department of Homeland Security et al.

Conflict in cyberspace is not a new phenomenon, but the legality of hostile cyber activity at a state level remains imperfectly defined. While the United States and its allies are in general agreement on the...

Jumpstart Your Platform

by La Counte Scott

Platform. It can make or break a writer. If you have it, then get ready for publishers to offer you contracts; and if you don’t? Let me kindly introduce you to the slush pile.

Whether you are a writer or another...

Web as History

by Niels Brügger & Ralph Schroeder

The World Wide Web has now been in use for more than 20 years. From early browsers to today’s principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to...

TechSmith Camtasia 9

by Kevin Siegel

... a self-paced workbook that teaches the core Camtasia 9 skills

Using TechSmith Camtasia 9, you can quickly create eLearning for software demonstrations, software simulations, soft skills lessons (such as onboarding...

Wireshark for Security Professionals

by Jessey Bullock & Adam Gordon

Master Wireshark to solve real-world security problems 

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly...

Advanced Penetration Testing

by Wil Allsopp

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide...

Creo Parametric 4.0 Black Book

by Gaurav Verma & Matt Weber

The Creo Parametric 4.0 Black Book is the second edition of our series on Creo Parametric. With lots of additions and thorough review, we present a book to help professionals as well as learners in creating...

AutoCAD 3D Modeling

by Steve Heather

The AutoCAD® 3D Modeling Exercise Workbook is designed for classroom instruction and self-study alike, and is suitable for both inch and metric users. There are 8 lessons and 4 modeling projects, all of which...


by Brandon Gillespie & Heather Monson

Fear has quietly and insidiously woven its way throughout the very fabric of how we do business in Technology. Our goals are driven by failure, rather than success.

Design Thinking is a powerful adjustment in...

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

by Kevin Mitnick

Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is...

How to create an Online Store using WooCommerce and Wordpress

by Riccardo Andronaco

This ebook comes from my experience with Wordpress and continuous use of WooCommerce. Currently it is increasingly demand the ability to create a personal website able to sell products in simple and practical...

Mark Xiornik Rozen Pettinelli Artwork

by Mark Rozen Pettinelli

These are digital modifications to the new photomanipulation, they are my best and most importantly the page of nature images. Thanks for your time and effort to make sure that you can get the best way for you...

Introduction to Social Innovation

by Gilberto Marzano & Mirosław Grewiński

It is commonly shared the idea that social innovation is the creation of social value by solving social problems. Accordingly, social innovation can be deemed to be the production of new solutions to social...

The Content Planner

by Angela Crocker

It’s important for bloggers to publish frequent, unique content, but they often struggle to take action. Some are overwhelmed at the prospect of brainstorming topics to write about, let alone writing and publishing...

Vlog Like a Boss

by Amy Schmittauer

Vlog Like a Boss is the complete guide to video blogging.

Amy Schmittauer is the Vlog Boss. As a new media triple threat — YouTuber, keynote speaker and author — she coaches people to go after what they want...

Thinking Pedagogically about Educational Technology Trends

by Jeremy Riel

Stay up to date on the latest trends and pedagogies with educational technology! With so much buzz surrounding new technologies for learning, it's hard to make sure that technology is truly being used for learning,...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

by Jr., John J. Trinckes

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening....