Best Selling / Page 78

icon Subscribe to feed


Best Selling

New Releases

Our selection




Delete Computers


In category

Programming (2382)

Personal Computing (1557)

Web (1271)

Database (814)

Graphism (773)

Enterprise software and computing (657)

System Administration (423)

Audio, Vidéo (413)

Hardware and devices (394)

Network and Telecommunications (111)

Computer Architecture (61)

Theory (2)





Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :



English (9627)

French (31)

German (72)

Spanish (117)

Italian (100)



All (11087)

DRM Free (1460)

DRM (9627)

More options

CCFP Certified Cyber Forensics Professional All-in-One Exam Guide

by Chuck Easttom

Get complete coverage of all six CCFP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. Written by a leading computer security expert, this authoritative...

The Shakespearean International Yearbook: Volume 14: Special Section, Digital Shakespeares

by Tom Bishop, Alexa Huang & Brett D. Hirsch

In 2002, for the second volume of this journal, Ian Lancashire reflected on the state of computing in Shakespeare. The decade since his review has seen dramatic change in the web of 'digital Shakespeares'. This...

Instant Autoit Scripting

by Laso Emilio Aristides de Fez

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This is a Packt Instant How-to guide, which provides concise and clear recipes for getting started...

Multimedia Programming with Pure Data

by Chung Bryan WC

A quick and comprehensive tutorial book for media designers to jump-start interactive multimedia production with computer graphics, digital audio, digital video, and interactivity, using the Pure Data graphical...

Agile Development & Business Goals: The Six Week Solution

by Bill Holtsnider, Tom Wheeler & George Stragand

Agile Development and Business Goals describes a unique, state-of-the-art methodology that aligns the critical but often "silo-ed" software development process with core company goals. Eschewing long-winded...

Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Un

by Cory Altheide & Harlan Carvey

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

It's no longer just a buzz word: "Security" is an important part of your job as a Systems Administrator. Most security books are aimed at security professionals, but Security for System Administrators is written...

Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

by Diane Barrett & Greg Kipper

Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which...

The Book Of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto

by Phil Champagne

Have you, like the rest of the world, speculated as to the identity of Satoshi Nakamoto, anonymous creator of Bitcoin? The world's first cryptocurrency, Bitcoin went online in 2009 and has since revolutionized...

The Practitioner's Guide to Project Management: Simple, Effective Techniques that Deliver Business Value

by Lynda Carter, David Balan & Gary Slavin

The Practitioner's Guide to Project Management provides simple, effective techniques in a way that encourages collaborative conversations with key resources and delivers business value. Book highlights include:...

Wireless Networking Complete

by Pei Zheng, Larry L. Peterson & Bruce S. Davie

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the...

Computer Animation Complete: All-in-One: Learn Motion Capture, Characteristic, Point-Based, and Maya Winning Techniques

by Rick Parent

A compilation of key chapters from the top MK computer animation books available today - in the areas of motion capture, facial features, solid spaces, fluids, gases, biology, point-based graphics, and Maya....

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

by Terrence V. Lillard

Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network...

Digital Triage Forensics: Processing the Digital Crime Scene

by Stephen Pearson & Richard Watson

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), which are employed in the investigation of digital crime scenes, including...

IT Manager's Handbook: The Business Edition: The Business Edition

by Bill Holtsnider & Brian D. Jaffe

IT Manager's Handbook: The Business Edition is a MUST-HAVE guide for the advancing technology professional who is looking to move up into a supervisory role, and is ideal for newly-promoted IT managers who needs...

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance

by Mark Horninger

SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005,...

A Guide to Kernel Exploitation: Attacking the Core

by Enrico Perla & Massimiliano Oldani

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the...

User Experience Re-Mastered: A Finely Tuned Guide to Creating The Best Design Every Time

by Chauncey Wilson

Good user interface design isn't just about aesthetics or using the latest technology. Designers also need to ensure their product is offering an optimal user experience. This requires user needs analysis, usability...

Managed Code Rootkits: Hooking into Runtime Environments

by Erez Metula

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer....

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm & Jason Andress

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests...