зарубежная компьютерная литература
“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better un…
“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better un…
Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendation systems are key elements of digital strategies. If development was originally intended for the performance of information systems, the issues are n…
Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendation systems are key elements of digital strategies. If development was originally intended for the performance of information systems, the issues are n…
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of…
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of…
This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which draws up…
This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which draws up…
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate networ…
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate networ…
A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that ap…
A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that ap…
The first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how synchroniza…
The first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how synchroniza…
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has unexp…
Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has unexp…
This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value creatio…
This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value creatio…
This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you…
This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you…
The main aim of this book is to offer companies a simple and practical method to assess their maturity in the Governance Information System, so that they are in working order to face the challenges of Digital Transformation. How can companies effecti…
The main aim of this book is to offer companies a simple and practical method to assess their maturity in the Governance Information System, so that they are in working order to face the challenges of Digital Transformation. How can companies effecti…
Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial Intelligence for Building Energy Analysis reviews recently developed models for solving these issues, including detailed and simplified engineering me…
Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial Intelligence for Building Energy Analysis reviews recently developed models for solving these issues, including detailed and simplified engineering me…
Digital technologies are reshaping every field of social and economic lives, so do they in the world of scientific knowledge. “The New Challenges of Knowledge” aims at understanding how the new digital technologies alter the production, diffusion and…
Digital technologies are reshaping every field of social and economic lives, so do they in the world of scientific knowledge. “The New Challenges of Knowledge” aims at understanding how the new digital technologies alter the production, diffusion and…
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and …
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and …
A unique, hands-on guide to interactive modeling and simulation of engineering systems This book describes advanced, cutting-edge techniques for dynamic system simulation using the DESIRE modeling/simulation software package. It offers detailed guida…
A unique, hands-on guide to interactive modeling and simulation of engineering systems This book describes advanced, cutting-edge techniques for dynamic system simulation using the DESIRE modeling/simulation software package. It offers detailed guida…
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on ad…
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on ad…
Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of conte…
Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of conte…
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT for bet…
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT for bet…
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the produ…
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the produ…
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences…
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences…