Computers

Best Selling / Page 206

icon Subscribe to feed

Browse

Best Selling

New Releases

Awards

 

Category

Delete Computers

 

In category

Programming (2307)

Personal Computing (1527)

Web (1309)

Database (774)

Graphism (690)

Enterprise software and computing (611)

Hardware and devices (425)

System Administration (402)

Audio, Vidéo (386)

Computer Architecture (66)

Network and Telecommunications (62)

Theory (2)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (9113)

French (438)

German (66)

Spanish (106)

Italian (503)

 

Protection

All (9113)

DRM Free (1447)

DRM (7666)

More options

My Samsung Galaxy S III

by Steve Schwartz

Friendly, quick, and 100% practical, My Samsung Galaxy S III is the must-have companion for every Samsung Galaxy S III user. Authored by Dr. Steven Schwartz, a leading expert in demystifying complex technologies,...


My Windows 8

by Katherine Murray

Step-by-step instructions with callouts to Windows 8 that show you exactly what to do.

Help when you run into Windows 8 problems or limitations.

Tips and Notes to help you get the most from Windows 8.

 ...


Complete CompTIA A+ Guide to PCs

by Cheryl Schmidt

Master PC installation, configuration, repair, maintenance, and networking

and fully prepare for the CompTIA A+ 220-801 and 220-802 exams

 

This unique tutorial and study guide teaches the fundamentals of...


The Official Joomla! Book

by Jennifer Marriott & Elin Waring

“Joomla! is about allowing ordinary people to do extraordinary things,  and that is exactly what the authors of this book do for its readers. . . . I present  this  book for your pleasure. It begins with...


Sams Teach Yourself Node.js in 24 Hours

by George Ornbo

In just 24 sessions of one hour or less, Sams Teach Yourself Node.js in 24 Hours will help you master the Node.js platform and use it to build server-side applications with extraordinary speed and scalability....


Secure Coding in C and C++

by Robert C. Seacord

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

 

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability...


OpenGL Programming Guide: The Official Guide to Learning OpenGL, Version 4.3

by Dave Shreiner, Graham Sellers & John M. Kessenich

Includes Complete Coverage of the OpenGL® Shading Language!

 

Today’s OpenGL software interface enables programmers to produce extraordinarily high-quality computer-generated images and interactive applications...


Java Performance

by Charlie Hunt & Binu John

“The definitive master class in performance tuning Java applications…if you love all the gory details, this is the book for you.”

–James Gosling, creator of the Java Programming Language

 

Improvements...


The Designer's Web Handbook: What You Need to Know to Create for the Web

by Patrick Mcneil

Make the Web Work for You

You know how to design. But you can increase your value as a designer in the marketplace by learning how to make that design function on the web. From informational sites to e-commerce...


Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle

by Charles Breakfield & Roxanne Burkey

Managing Systems Migrations and Upgrades is the perfect book for technology managers who want a rational guide to evaluating the business aspects of various possible technical solutions. Enterprises today are...


Snort Intrusion Detection 2.0

by Syngress

The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments.

Snort 2.0 Intrusion Detection is the first...


Hack Proofing Your Network 2E

by Syngress

A new edition the most popular Hack Proofing book around!

IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best...


E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

by Syngress

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later...


Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

by Eric Cole, Michael Nordfelt & Sandra Ring

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...


Text Entry Systems: Mobility, Accessibility, Universality

by I. Scott MacKenzie & Kumiko Tanaka-Ishii

Text entry has never been so important as it is today. This is in large part due to the phenomenal, relatively recent success of mobile computing, text messaging on mobile phones, and the proliferation of small...


Strategies for Growth in SMEs: The Role of Information and Information Sytems

by Margi Levy & Philip Powell

Strategies for Growth in SMEs explores for the first time the role of information and information systems (IS) concepts in small and medium-sized enterprises (SMEs). Most IS research focuses on large firms,...


Digital Logic Design

by Brian Holdsworth & Clive Woods

New, updated and expanded topics in the fourth edition include: EBCDIC, Grey code, practical applications of flip-flops, linear and shaft encoders, memory elements and FPGAs. The section on fault-finding has...


Host Integrity Monitoring Using Osiris and Samhain

by Brian Wotring

This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance,...


Threat Talk: The Comparative Politics of Internet Addiction

by Mary Manjikian

'Threat Talk' exposes how US and Chinese scientists and policy-makers have understood and responded to the problem of internet addiction in their societies. Mary Manjikian's culturalist approach claims that...


Microsoft Access 2010 in Depth

by Roger Jennings

Access 2010 In Depth is the beyond-the-basics, beneath-the-surface guide for everyone who wants to streamline their work with Access 2010, and get more done in less time. Legendary Access expert Roger Jennings...