Computers

Best Selling / Page 78

icon Subscribe to feed

Browse

Best Selling

New Releases

Our selection

Awards

 

Category

Delete Computers

 

In category

Programming (2155)

Personal Computing (1366)

Web (1163)

Database (753)

Graphism (698)

Enterprise software and computing (636)

System Administration (411)

Hardware and devices (368)

Audio, Vidéo (361)

Network and Telecommunications (86)

Computer Architecture (60)

Theory (2)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (8850)

French (31)

German (73)

Spanish (119)

Italian (96)

 

Protection

All (10307)

DRM Free (1457)

DRM (8850)

More options

Agile Development & Business Goals: The Six Week Solution

by Bill Holtsnider, Tom Wheeler & George Stragand

Agile Development and Business Goals describes a unique, state-of-the-art methodology that aligns the critical but often "silo-ed" software development process with core company goals. Eschewing long-winded...


Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Un

by Cory Altheide & Harlan Carvey

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use...


Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

It's no longer just a buzz word: "Security" is an important part of your job as a Systems Administrator. Most security books are aimed at security professionals, but Security for System Administrators is written...


Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

by Diane Barrett & Greg Kipper

Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which...


The Book Of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto

by Phil Champagne

Have you, like the rest of the world, speculated as to the identity of Satoshi Nakamoto, anonymous creator of Bitcoin? The world's first cryptocurrency, Bitcoin went online in 2009 and has since revolutionized...


The Practitioner's Guide to Project Management: Simple, Effective Techniques that Deliver Business Value

by Lynda Carter, David Balan & Gary Slavin

The Practitioner's Guide to Project Management provides simple, effective techniques in a way that encourages collaborative conversations with key resources and delivers business value. Book highlights include:...


Wireless Networking Complete

by Pei Zheng, Larry L. Peterson & Bruce S. Davie

Given the explosion of new wireless communications techniques and the host of wireless network technologies and applications currently available or on the drawing board, it is safe to say that we are in the...


Computer Animation Complete: All-in-One: Learn Motion Capture, Characteristic, Point-Based, and Maya Winning Techniques

by Rick Parent

A compilation of key chapters from the top MK computer animation books available today - in the areas of motion capture, facial features, solid spaces, fluids, gases, biology, point-based graphics, and Maya....


Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

by Terrence V. Lillard

Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network...


Digital Triage Forensics: Processing the Digital Crime Scene

by Stephen Pearson & Richard Watson

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), which are employed in the investigation of digital crime scenes, including...


IT Manager's Handbook: The Business Edition: The Business Edition

by Bill Holtsnider & Brian D. Jaffe

IT Manager's Handbook: The Business Edition is a MUST-HAVE guide for the advancing technology professional who is looking to move up into a supervisory role, and is ideal for newly-promoted IT managers who needs...


The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance

by Mark Horninger

SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005,...


A Guide to Kernel Exploitation: Attacking the Core

by Enrico Perla & Massimiliano Oldani

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the...


User Experience Re-Mastered: A Finely Tuned Guide to Creating The Best Design Every Time

by Chauncey Wilson

Good user interface design isn't just about aesthetics or using the latest technology. Designers also need to ensure their product is offering an optimal user experience. This requires user needs analysis, usability...


Managed Code Rootkits: Hooking into Runtime Environments

by Erez Metula

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer....


Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm & Jason Andress

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests...


Using Google Spreadsheets (Digital Short Cut)

by Michael Miller

This is the eBook version of the printed book.

Google Spreadsheets is the new web-based spreadsheet application that's giving Microsoft Excel a run for its money. With Google Spreadsheets, you can create complex...


Useful Custom FileMaker 8 Functions (Digital Short Cut)

by Steve Lane, Scott Love & Bob Bowers

This is the eBook version of the printed book.

This Short Cut presents a sampling of custom functions that we’ve found useful, or that serve as good examples of functions in our day-to-day practice. The functions...


Understanding Customer Needs (Digital Short Cut): Software QFD and the Voice of the Customer

by Bijay K. Jayaswal, Peter C. Patton & Richard E. Zultner

This is the eBook version of the printed book.

Leading companies around the world, including Toyota and General Electric, have practiced Quality Function Deployment (QFD) for decades. Developed in Japan by Dr....


Six Sigma for Marketing Processes: An Overview for Marketing Executives, Leaders, and Managers

by Clyde M. Creveling, Lynne Hambleton & Burke McCarthy

Nearly half of the top one hundred Fortune 500 companies use Six Sigma methodology in some part of their business. These companies have been among the top one hundred for five or more years and consistently...