зарубежная компьютерная литература

Insider Threats
4
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
Adobe Photoshop CS6 Top 100 Simplified Tips and Tricks
4
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and techniques. Filled with beyond-the-essentials techniques that show how to take your Photoshop skills to…
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and techniques. Filled with beyond-the-essentials techniques that show how to take your Photoshop skills to…
Requirements Modelling and Specification for Service Oriented Architecture
3
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here i…
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here i…
Microprocessor Theory and Applications with 68000/68020 and Pentium
4
A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Int…
A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Int…
Business Rules Management and Service Oriented Architecture
5
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Managing the Human Factor in Information Security
3
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
Grammars with Context Conditions and Their Applications
5
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
Architecture-Independent Programming for Wireless Sensor Networks
5
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
Game Character Creation with Blender and Unity
3
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
Relational Database Index Design and the Optimizers
5
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receive…
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receive…
Data Mining and Business Analytics with R
3
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Looking Back and Going Forward in IT
3
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
Multimedia Broadcasting and Multicasting in Mobile Networks
5
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Programming PC Connectivity Applications for Symbian OS
3
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide desig…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide desig…
Department of Defense Sponsored Information Security Research
5
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to…
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to…
Implementing 802.1X Security Solutions for Wired and Wireless Networks
5
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x …
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x …
Aligning Business and IT with Metadata
4
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance. The author Hans Wegener reveals how metadata can be used to …
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance. The author Hans Wegener reveals how metadata can be used to …
Arithmetic and Logic in Computer Systems
4
Arithmetic and Logic in Computer Systems provides a useful guide to a fundamental subject of computer science and engineering. Algorithms for performing operations like addition, subtraction, multiplication, and division in digital computer systems a…
Arithmetic and Logic in Computer Systems provides a useful guide to a fundamental subject of computer science and engineering. Algorithms for performing operations like addition, subtraction, multiplication, and division in digital computer systems a…
Interoperability for Enterprise Software and Applications
4
During the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise application…
During the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise application…
Fundamentals of Computer Organization and Architecture
5
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and …
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and …

Популярные авторы