bannerbanner

зарубежная компьютерная литература

Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions
4
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious co…
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious co…
Fiber Optics Installer (FOI) Certification Exam Guide
3
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundation in fiber optics and thorough preparation for the Fiber Optics Installer (FOI) certification. Endor…
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundation in fiber optics and thorough preparation for the Fiber Optics Installer (FOI) certification. Endor…
Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS
3
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a neces…
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a neces…
Security Intelligence. A Practitioner's Guide to Solving Enterprise Security Challenges
5
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitut…
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitut…
The Mobile Application Hacker's Handbook
3
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily pract…
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily pract…
Crowdsourcing. One Step Beyond
3
Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new busine…
Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new busine…
Information Centric Networks. A New Paradigm for the Internet
4
Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that applications are…
Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that applications are…
Lean Computing for the Cloud
4
Applies lean manufacturing principles across the cloud service delivery chain to enable application and infrastructure service providers to sustainably achieve the shortest lead time, best quality, and value Applies lean thinking across the cloud ser…
Applies lean manufacturing principles across the cloud service delivery chain to enable application and infrastructure service providers to sustainably achieve the shortest lead time, best quality, and value Applies lean thinking across the cloud ser…
Graph-related Optimization and Decision Support Systems
5
Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two main com…
Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two main com…
Service Quality of Cloud-Based Applications
5
This book explains why applications running on cloud might not deliver the same service reliability, availability, latency and overall quality to end users as they do when the applications are running on traditional (non-virtualized, non-cloud) confi…
This book explains why applications running on cloud might not deliver the same service reliability, availability, latency and overall quality to end users as they do when the applications are running on traditional (non-virtualized, non-cloud) confi…
Public Key Cryptography. Applications and Attacks
5
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public ke…
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public ke…
Computing Fundamentals. IC3 Edition
5
Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft Offic…
Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft Offic…
Digital Disciplines. Attaining Market Leadership via the Cloud, Big Data, Social, Mobile, and the Internet of Things
4
Leverage digital technologies to achieve competitive advantage through market-leading processes, products and services, customer relationships, and innovation How does Information Technology enable competitive advantage? Digital Disciplines details f…
Leverage digital technologies to achieve competitive advantage through market-leading processes, products and services, customer relationships, and innovation How does Information Technology enable competitive advantage? Digital Disciplines details f…
Coding with JavaScript For Dummies
4
Go from beginner to builder quickly with this hands-on JavaScript guide Coding with JavaScript For Dummies provides easy, hands-on instruction for anyone looking to learn this popular client-side language. No experience? No problem! This friendly gui…
Go from beginner to builder quickly with this hands-on JavaScript guide Coding with JavaScript For Dummies provides easy, hands-on instruction for anyone looking to learn this popular client-side language. No experience? No problem! This friendly gui…
Teach Yourself VISUALLY Excel 2016
5
See your way to Excel spreadsheet stardom with this visual guide If you're always hearing about the cool things Excel can do, here's your chance to see how to do them!Teach Yourself Visually Excel offers you a straightforward visual approach to worki…
See your way to Excel spreadsheet stardom with this visual guide If you're always hearing about the cool things Excel can do, here's your chance to see how to do them!Teach Yourself Visually Excel offers you a straightforward visual approach to worki…
CompTIA Network+ Review Guide. Exam N10-006
3
Be prepared for the Network+ exam CompTIA Network+ Review Guide is your ideal study companion for preparing for the CompTIA Network+ exam (N10-006). This concise review is the perfect companion to the CompTIA Network+ Study Guide and the CompTIA Netw…
Be prepared for the Network+ exam CompTIA Network+ Review Guide is your ideal study companion for preparing for the CompTIA Network+ exam (N10-006). This concise review is the perfect companion to the CompTIA Network+ Study Guide and the CompTIA Netw…
Teach Yourself VISUALLY Samsung Galaxy S6
5
Your visual guide to unlocking the full potential of the Samsung Galaxy Teach Yourself VISUALLY Samsung Galaxy is your step-by-step, visual guide to everything your new phone has to offer. With expert guidance from veteran technology author Guy Hart-…
Your visual guide to unlocking the full potential of the Samsung Galaxy Teach Yourself VISUALLY Samsung Galaxy is your step-by-step, visual guide to everything your new phone has to offer. With expert guidance from veteran technology author Guy Hart-…
Samsung Galaxy S6 for Dummies
3
Explore the capabilities of your Samsung Galaxy S 6 with this definitive guide! Learning to use a new phone can be both difficult and frustrating. With confusing documentation and baffling support, the references provided by phone manufacturers can b…
Explore the capabilities of your Samsung Galaxy S 6 with this definitive guide! Learning to use a new phone can be both difficult and frustrating. With confusing documentation and baffling support, the references provided by phone manufacturers can b…
CompTIA A+ Complete Review Guide. Exams 220-901 and 220-902
5
Complete, objective-by-objective review for the A+ exam The CompTIA A+ Complete Review Guide, 3rd Edition is your ideal solution for preparing for exams 220-901 and 220-902. The perfect companion to the CompTIA A+ Complete Study Guide, 3rd Edition th…
Complete, objective-by-objective review for the A+ exam The CompTIA A+ Complete Review Guide, 3rd Edition is your ideal solution for preparing for exams 220-901 and 220-902. The perfect companion to the CompTIA A+ Complete Study Guide, 3rd Edition th…
PMP Project Management Professional Exam Review Guide
5
Provides focused, concise review of PMP updated 2015 Exam objectives and compliments the PMP Project Management Professional Exam Study Guide, 8th Edition and the PMP Project Management Professional Exam Deluxe Study Guide, 2nd Edition. Includes inte…
Provides focused, concise review of PMP updated 2015 Exam objectives and compliments the PMP Project Management Professional Exam Study Guide, 8th Edition and the PMP Project Management Professional Exam Deluxe Study Guide, 2nd Edition. Includes inte…

Популярные авторы