bannerbanner

зарубежная компьютерная литература

Managing the Human Factor in Information Security
3
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
Grammars with Context Conditions and Their Applications
5
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
Architecture-Independent Programming for Wireless Sensor Networks
5
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
Game Character Creation with Blender and Unity
3
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
Relational Database Index Design and the Optimizers
5
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receive…
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receive…
Data Mining and Business Analytics with R
3
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Looking Back and Going Forward in IT
3
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
Multimedia Broadcasting and Multicasting in Mobile Networks
5
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Programming PC Connectivity Applications for Symbian OS
3
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide desig…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide desig…
Department of Defense Sponsored Information Security Research
5
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to…
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to…
Implementing 802.1X Security Solutions for Wired and Wireless Networks
5
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x …
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x …
Aligning Business and IT with Metadata
4
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance. The author Hans Wegener reveals how metadata can be used to …
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance. The author Hans Wegener reveals how metadata can be used to …
Arithmetic and Logic in Computer Systems
4
Arithmetic and Logic in Computer Systems provides a useful guide to a fundamental subject of computer science and engineering. Algorithms for performing operations like addition, subtraction, multiplication, and division in digital computer systems a…
Arithmetic and Logic in Computer Systems provides a useful guide to a fundamental subject of computer science and engineering. Algorithms for performing operations like addition, subtraction, multiplication, and division in digital computer systems a…
Interoperability for Enterprise Software and Applications
4
During the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise application…
During the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise application…
Fundamentals of Computer Organization and Architecture
5
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and …
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and …
Advanced Computer Architecture and Parallel Processing
3
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word…
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word…
Micro, Nanosystems and Systems on Chips
3
Micro and nanosystems represent a major scientific and technological challenge, with actual and potential applications in almost all fields of the human activity. The aim of the present book is to present how concepts from dynamical control systems (…
Micro and nanosystems represent a major scientific and technological challenge, with actual and potential applications in almost all fields of the human activity. The aim of the present book is to present how concepts from dynamical control systems (…
Teach Yourself VISUALLY Adobe Photoshop CS6
3
Gets visual learners up to speed on the newest enhancements in Photoshop Photoshop is constantly evolving, and the newest version offers great new tools for photographers. This popular guide gets visual learners up to speed quickly; previous editions…
Gets visual learners up to speed on the newest enhancements in Photoshop Photoshop is constantly evolving, and the newest version offers great new tools for photographers. This popular guide gets visual learners up to speed quickly; previous editions…
Distributed Data Management for Grid Computing
4
Discover grid computing-how to successfully build, implement, and manage widely distributed computing architecture With technology budgets under increasing scrutiny and system architecture becoming more and more complex, many organizations are rethin…
Discover grid computing-how to successfully build, implement, and manage widely distributed computing architecture With technology budgets under increasing scrutiny and system architecture becoming more and more complex, many organizations are rethin…
Knowledge Discovery with Support Vector Machines
3
An easy-to-follow introduction to support vector machines This book provides an in-depth, easy-to-follow introduction to support vector machines drawing only from minimal, carefully motivated technical and mathematical background material. It begins …
An easy-to-follow introduction to support vector machines This book provides an in-depth, easy-to-follow introduction to support vector machines drawing only from minimal, carefully motivated technical and mathematical background material. It begins …

Популярные авторы