bannerbanner

зарубежная компьютерная литература

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
3
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of s…
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of s…
Design for Reliability. Information and Computer-Based Systems
3
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustnes…
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustnes…
Practical Database Programming With Visual C#.NET
4
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database programming with Visual C#.NET 2008 and in developing relation…
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database programming with Visual C#.NET 2008 and in developing relation…
Design of Multithreaded Software. The Entity-Life Modeling Approach
3
This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM focuses on «reactive systems,» which continuously inter…
This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM focuses on «reactive systems,» which continuously inter…
Data Mining and Statistics for Decision Making
3
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Dat…
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Dat…
Information Security. Principles and Practice
4
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative…
Service-Learning in the Computer and Information Sciences. Practical Applications in Engineering Education
5
Offering a truly global perspective, this book serves as a road map for service-learning partnerships between information science and nonprofit organizations. It introduces for the first time an essential framework for service learning in CIS, addres…
Offering a truly global perspective, this book serves as a road map for service-learning partnerships between information science and nonprofit organizations. It introduces for the first time an essential framework for service learning in CIS, addres…
Information Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
5
The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critic…
The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critic…
The Death of the Internet
5
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may…
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may…
Cybercrime and Cyber Warfare
4
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discu…
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discu…
Software Architecture 1
3
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software sy…
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software sy…
Software Architecture 2
5
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software sy…
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software sy…
The Art of Videogames
5
The Art of Videogames explores how philosophy of the arts theories developed to address traditional art works can also be applied to videogames. Presents a unique philosophical approach to the art of videogaming, situating videogames in the framework…
The Art of Videogames explores how philosophy of the arts theories developed to address traditional art works can also be applied to videogames. Presents a unique philosophical approach to the art of videogaming, situating videogames in the framework…
CSS3 Foundations
5
Master innovative and eye-catching website design with the exciting new Treehouse Series of books Turn plain words and images into stunning websites with CSS3 and this beautiful, full-color guide. Taking web designers beyond the constraints of prebui…
Master innovative and eye-catching website design with the exciting new Treehouse Series of books Turn plain words and images into stunning websites with CSS3 and this beautiful, full-color guide. Taking web designers beyond the constraints of prebui…
Computer System Design. System-on-Chip
5
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge…
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge…
IPv6 Deployment and Management
4
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including…
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including…
Lean Architecture. for Agile Software Development
5
More and more Agile projects are seeking architectural roots as they struggle with complexity and scale – and they're seeking lightweight ways to do it Still seeking? In this book the authors help you to find your own path Taking cues from Lean devel…
More and more Agile projects are seeking architectural roots as they struggle with complexity and scale – and they're seeking lightweight ways to do it Still seeking? In this book the authors help you to find your own path Taking cues from Lean devel…
Harnessing Green IT. Principles and Practices
3
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT …
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT …
Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems
3
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system s…
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system s…
Codecharts. Roadmaps and blueprints for object-oriented programs
4
NEW LANGUAGE VISUALIZES PROGRAM ABSTRACTIONS CLEARLY AND PRECISELY Popular software modelling notations visualize implementation minutiae but fail to scale, to capture design abstractions, and to deliver effective tool support. Tailored to overcome t…
NEW LANGUAGE VISUALIZES PROGRAM ABSTRACTIONS CLEARLY AND PRECISELY Popular software modelling notations visualize implementation minutiae but fail to scale, to capture design abstractions, and to deliver effective tool support. Tailored to overcome t…

Популярные авторы