Best Selling / Page 206

icon Subscribe to feed


Best Selling

New Releases




Delete Computers


In category

Programming (2304)

Personal Computing (1523)

Web (1307)

Database (774)

Graphism (690)

Enterprise software and computing (611)

Hardware and devices (425)

System Administration (401)

Audio, Vidéo (386)

Computer Architecture (66)

Network and Telecommunications (62)

Theory (2)





Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :



English (9105)

French (439)

German (66)

Spanish (106)

Italian (503)



All (9105)

DRM Free (1438)

DRM (7667)

More options

Routing TCP/IP, Volume I

by Jeff Doyle & Jennifer Carroll

A detailed examination of interior routing protocols -- completely updated in a new edition


  • A complete revision of the best-selling first edition--widely considered a premier text on TCP/IP routing protocols...

  • My Samsung Galaxy S III

    by Steve Schwartz

    Friendly, quick, and 100% practical, My Samsung Galaxy S III is the must-have companion for every Samsung Galaxy S III user. Authored by Dr. Steven Schwartz, a leading expert in demystifying complex technologies,...

    My Windows 8

    by Katherine Murray

    Step-by-step instructions with callouts to Windows 8 that show you exactly what to do.

    Help when you run into Windows 8 problems or limitations.

    Tips and Notes to help you get the most from Windows 8.


    Complete CompTIA A+ Guide to PCs

    by Cheryl Schmidt

    Master PC installation, configuration, repair, maintenance, and networking

    and fully prepare for the CompTIA A+ 220-801 and 220-802 exams


    This unique tutorial and study guide teaches the fundamentals of...

    The Official Joomla! Book

    by Jennifer Marriott & Elin Waring

    “Joomla! is about allowing ordinary people to do extraordinary things,  and that is exactly what the authors of this book do for its readers. . . . I present  this  book for your pleasure. It begins with...

    Sams Teach Yourself Node.js in 24 Hours

    by George Ornbo

    In just 24 sessions of one hour or less, Sams Teach Yourself Node.js in 24 Hours will help you master the Node.js platform and use it to build server-side applications with extraordinary speed and scalability....

    Secure Coding in C and C++

    by Robert C. Seacord

    Learn the Root Causes of Software Vulnerabilities and How to Avoid Them


    Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability...

    OpenGL Programming Guide: The Official Guide to Learning OpenGL, Version 4.3

    by Dave Shreiner, Graham Sellers & John M. Kessenich

    Includes Complete Coverage of the OpenGL® Shading Language!


    Today’s OpenGL software interface enables programmers to produce extraordinarily high-quality computer-generated images and interactive applications...

    Java Performance

    by Charlie Hunt & Binu John

    “The definitive master class in performance tuning Java applications…if you love all the gory details, this is the book for you.”

    –James Gosling, creator of the Java Programming Language



    The Designer's Web Handbook: What You Need to Know to Create for the Web

    by Patrick Mcneil

    Make the Web Work for You

    You know how to design. But you can increase your value as a designer in the marketplace by learning how to make that design function on the web. From informational sites to e-commerce...

    Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle

    by Charles Breakfield & Roxanne Burkey

    Managing Systems Migrations and Upgrades is the perfect book for technology managers who want a rational guide to evaluating the business aspects of various possible technical solutions. Enterprises today are...

    Snort Intrusion Detection 2.0

    by Syngress

    The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments.

    Snort 2.0 Intrusion Detection is the first...

    Hack Proofing Your Network 2E

    by Syngress

    A new edition the most popular Hack Proofing book around!

    IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best...

    E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

    by Syngress

    The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later...

    Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

    by Eric Cole, Michael Nordfelt & Sandra Ring

    This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...

    Text Entry Systems: Mobility, Accessibility, Universality

    by I. Scott MacKenzie & Kumiko Tanaka-Ishii

    Text entry has never been so important as it is today. This is in large part due to the phenomenal, relatively recent success of mobile computing, text messaging on mobile phones, and the proliferation of small...

    Strategies for Growth in SMEs: The Role of Information and Information Sytems

    by Margi Levy & Philip Powell

    Strategies for Growth in SMEs explores for the first time the role of information and information systems (IS) concepts in small and medium-sized enterprises (SMEs). Most IS research focuses on large firms,...

    Digital Logic Design

    by Brian Holdsworth & Clive Woods

    New, updated and expanded topics in the fourth edition include: EBCDIC, Grey code, practical applications of flip-flops, linear and shaft encoders, memory elements and FPGAs. The section on fault-finding has...

    Host Integrity Monitoring Using Osiris and Samhain

    by Brian Wotring

    This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance,...

    Threat Talk: The Comparative Politics of Internet Addiction

    by Mary Manjikian

    'Threat Talk' exposes how US and Chinese scientists and policy-makers have understood and responded to the problem of internet addiction in their societies. Mary Manjikian's culturalist approach claims that...