зарубежная компьютерная литература
This comprehensive reference by a Microsoft expert covers all aspects of the new Windows release The much-anticipated release of Windows 7 will have numerous changes, and you'll need a complete guide to take full advantage of all it has to offer. Win…
This comprehensive reference by a Microsoft expert covers all aspects of the new Windows release The much-anticipated release of Windows 7 will have numerous changes, and you'll need a complete guide to take full advantage of all it has to offer. Win…
A solid introduction to the practices, plans, and skills required for developing a smart system architecture Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goal…
A solid introduction to the practices, plans, and skills required for developing a smart system architecture Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goal…
Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in a…
Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in a…
A comprehensive tutorial on how to use the power of Velocity 1.3 to build Web sites and generate content Designed to work hand-in-hand with Apache Turbine, Struts, and servlets, Velocity is a powerful template language that greatly enhances the devel…
A comprehensive tutorial on how to use the power of Velocity 1.3 to build Web sites and generate content Designed to work hand-in-hand with Apache Turbine, Struts, and servlets, Velocity is a powerful template language that greatly enhances the devel…
The first book available on this fast-growing and highly regarded software package MindManager allows users to visually map their ideas and brainstorming sessions in order to better organize thoughts and put them into action. Exploring all there is t…
The first book available on this fast-growing and highly regarded software package MindManager allows users to visually map their ideas and brainstorming sessions in order to better organize thoughts and put them into action. Exploring all there is t…
Did you ever wish you could draw folks a picture of your business processes or the design of your database, but you just don’t have the graphics skills? Then Visio 2003 might be exactly what you’re looking for, and Visio 2003 For Dummies makes it eas…
Did you ever wish you could draw folks a picture of your business processes or the design of your database, but you just don’t have the graphics skills? Then Visio 2003 might be exactly what you’re looking for, and Visio 2003 For Dummies makes it eas…
The heart of the book provides the complete set of models that will support most of an organization's core business functions, including universal meta models for enterprise-wide systems, business meta data and data stewardship, portfolio management,…
The heart of the book provides the complete set of models that will support most of an organization's core business functions, including universal meta models for enterprise-wide systems, business meta data and data stewardship, portfolio management,…
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with S…
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with S…
Written by one of the leading experts in content management systems (CMS), this newly revised bestseller guides readers through the confusing-and often intimidating-task of building, implementing, running, and managing a CMS Updated to cover recent d…
Written by one of the leading experts in content management systems (CMS), this newly revised bestseller guides readers through the confusing-and often intimidating-task of building, implementing, running, and managing a CMS Updated to cover recent d…
On its own, C# simplifies network programming. Combine it with the precise instruction found in C# Network Programming, and you'll find that building network applications is easier and quicker than ever. This book helps newcomers get started with a l…
On its own, C# simplifies network programming. Combine it with the precise instruction found in C# Network Programming, and you'll find that building network applications is easier and quicker than ever. This book helps newcomers get started with a l…
Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Readers Choice Award If you're looking to capitalize on the powerful capabilities of the latest release of Delphi, Mastering Delphi 6 is the one resource…
Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Readers Choice Award If you're looking to capitalize on the powerful capabilities of the latest release of Delphi, Mastering Delphi 6 is the one resource…
WRITE BULLETPROOF VBA CODE FOR ANY SITUATION This book is the essential resource for developers working with any of the more than 300 products that employ the Visual Basic for Applications programming language. Written by recognized VBA experts, it p…
WRITE BULLETPROOF VBA CODE FOR ANY SITUATION This book is the essential resource for developers working with any of the more than 300 products that employ the Visual Basic for Applications programming language. Written by recognized VBA experts, it p…
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, an…
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, an…
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2B marketplace is rapidly exploding–fast outpacing business-to-consumer e-commerce and expected to reach more than $7 trillion in s…
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2B marketplace is rapidly exploding–fast outpacing business-to-consumer e-commerce and expected to reach more than $7 trillion in s…
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs,…
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs,…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of servi…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of servi…
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experienc…
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experienc…
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own tru…
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own tru…
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the file input/output aspects of UNIX programming Describe…
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the file input/output aspects of UNIX programming Describe…
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a m…
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a m…