New Releases

icon Subscribe to feed


Best Selling

New Releases




Delete Computers


In category

Programming (3284)

Personal Computing (1982)

Web (1803)

Database (1093)

Graphism (758)

System Administration (705)

Enterprise software and computing (682)

Audio, Vidéo (566)

Hardware and devices (432)

Network and Telecommunications (162)

Computer Architecture (86)

Theory (2)



English (12120)

French (632)

German (1359)

Spanish (170)

Italian (619)



All (12120)

DRM Free (1507)

DRM (10613)

More options

Statistical Regression and Classification: From Linear Models to Machine Learning

by Norman Matloff

Statistical Regression and Classification: From Linear Models to Machine Learning takes an innovative look at the traditional statistical regression course, presenting a contemporary treatment in line with today's...

Significant Zero: Heroes, Villains, and the Fight for Art and Soul in Video Games

by Walt Williams

From the award-winning videogame writer behind Spec Ops: The Line comes an exclusive behind-the-scenes look at how today’s blockbuster video games are made.

When his satirical musings in a college newspaper...

Use of Cyber Threat Intelligence in Security Operation Center

by Arun E Thomas

The term “Cyber Threat Intelligence” has gained considerable interest in the Information Security community over the past few years. The main purpose of implementing a Cyber threat intelligence(CTI) program...

Protecting Your Children Online: What You Need to Know About Online Threats to Your Children

by Kimberly Ann McCabe

Children are very vulnerable and perfect targets to internet crimes, with that new technology presents complex challenges for law enforcement agencies and victim service providers. This book provides parents...

Protecting Your Children Online

by Kimberly Ann McCabe

As parents, our main job is to protect our children. These days, protection from includes not only the individuals we can see but, also, the individuals that we cannot see – yet who wish to harm our children....

Healthcare Information Technology Exam Guide for CHTS and CAHIMS Certifications

by Kathleen A. McCormick, Brian Gugerty & John Mattison

The Complete Healthcare Information Technology Reference and Exam Guide

Gain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business...

Discovering British Literature in Bits and Bytes

by Carolyn M. Johnson

An introduction British Literature through the internet, for use with secondary school and beginning college or university students; for basic curriculum or extracurricular lessons or online literature courses...

iPhone Photography for Everybody

by Michael Fagans

Three Benefits to Readers 1. Learn to approach image-making more creatively 2. Use the iPhone’s stripped-down controls most effectively 3. Create images with greater visual impact

A Systematic Approach to Learning Robot Programming with ROS

by Wyatt Newman

A Systematic Approach to Learning Robot Programming with ROS provides a comprehensive, introduction to the essential components of ROS through detailed explanations of simple code examples along with the corresponding...

Big Data Strategies for Agile Business

by Bhuvan Unhelkar

Agile is a set of values, principles, techniques, and frameworks for the adaptable, incremental, and efficient delivery of work. Big Data is a rapidly growing field that encompasses crucial aspects of data such...

Beyond Agile

by Paul Scott, Andrew Walker & Grace O'Brien

On average, 50 per cent of software projects fail to deliver on time or on budget.

At least 20 per cent are cancelled before completion or renounced as failures.

Project failure costs the global economy nearly...

Data Mining for Business Analytics

by Galit Shmueli, Peter C. Bruce, Inbal Yahav & Nitin R. Patel et al.

Data Mining for Business Analytics: Concepts, Techniques, and Applications in R presents an applied approach to data mining concepts and methods, using R software for illustration

Readers will learn how to implement...

The Right Way to Select Technology

by Tony Byrne & Jarrod Gingras

Why do half of all technology projects fail? A major reason is that organizations often pick the wrong tools, leaving them digitally hamstrung from the start. This book offers a modern alternative to traditional...

The Entrepreneurial Project Manager

by Chris Cook

Doing more with less is a skill mastered by entrepreneurs. Budgets are tight, deadlines are short, and time is of the essence. Entrepreneurial project managers use these parameters to their benefit. Hurdling...

Youtube Celebrity

by Patty Feed

In this ebook you will learn how to master Youtube and become a successful businessman thanks to it

Innovations in E-Systems for Business and Commerce

by Seifedine Kadry & Abdelkhalak El Hami

Innovations in E-Systems for Business and Commerce presents some of the latest research and direction in the field of e-business and e-commerce. With up-to-date information for top researchers from around the...

Python Interview Questions You'll Most Likely Be Asked

by Vibrant Publishers

  • 215 Python Interview Questions
  • 78 HR Interview Questions 
  • Real life scenario based questions
  • Strategies to respond to interview questions
  • 2 Aptitude Tests


Python Interview Questions You'll Most Likely...

Responsive Security: Be Ready to Be Secure

by Meng-Chow Kang

Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and...

Network Security Through Data Analysis: From Data to Action

by Michael Collins

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows...

Java 9 Modularity: Patterns and Practices for Developing Maintainable Applications

by Sander Mak & Paul Bakker

The upcoming Java 9 module system will affect existing applications and offer new ways of creating modular and maintainable applications. With this hands-on book, Java developers will learn not only about the...