bannerbanner

зарубежная компьютерная литература

Artificial Intelligence For Dummies
4
Step into the future with AI The term «Artificial Intelligence» has been around since the 1950s, but a lot has changed since then. Today, AI is referenced in the news, books, movies, and TV shows, and the exact definition is often misinterpreted. Art…
Step into the future with AI The term «Artificial Intelligence» has been around since the 1950s, but a lot has changed since then. Today, AI is referenced in the news, books, movies, and TV shows, and the exact definition is often misinterpreted. Art…
Artificial Intelligence and Big Data
3
With the idea of “deep learning” having now become the key to this new generation of solutions, major technological players in the business intelligence sector have taken an interest in the application of Big Data. In this book, the author explores t…
With the idea of “deep learning” having now become the key to this new generation of solutions, major technological players in the business intelligence sector have taken an interest in the application of Big Data. In this book, the author explores t…
Mastering AutoCAD 2019 and AutoCAD LT 2019
4
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, technique…
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, technique…
The Accredited Symbian Developer Primer
3
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know. The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identify…
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know. The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identify…
Windows Security Monitoring
3
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Micr…
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Micr…
Mastering the SAP Business Information Warehouse
4
This book is insightful and thought-provoking for even the most seasoned SAP BW individual. —Richard M. Dunning, Chair, American SAP Users Group Written by the leading experts in the field, this comprehensive guide shows you how to implement the SAP …
This book is insightful and thought-provoking for even the most seasoned SAP BW individual. —Richard M. Dunning, Chair, American SAP Users Group Written by the leading experts in the field, this comprehensive guide shows you how to implement the SAP …
The Data Warehouse ETL Toolkit
4
Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or the …
Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or the …
The Data Warehouse Lifecycle Toolkit
4
A thorough update to the industry standard for designing, developing, and deploying data warehouse and business intelligence systems The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle Toolkit …
A thorough update to the industry standard for designing, developing, and deploying data warehouse and business intelligence systems The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle Toolkit …
The Transverse Information Systems
4
Information systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves apar…
Information systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves apar…
The Digital Era 1
4
For 200 years, industry mastered iron, fire, strength and energy. Today, electronics shapes our everyday objects, integrating chips: computers, phones, keys, games, household appliances, etc. Data, software and calculation frame the conduct of humank…
For 200 years, industry mastered iron, fire, strength and energy. Today, electronics shapes our everyday objects, integrating chips: computers, phones, keys, games, household appliances, etc. Data, software and calculation frame the conduct of humank…
Traceable Human Experiment Design Research
5
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
Human Memory Modeled with Standard Analog and Digital Circuits
4
Gain a new perspective on how the brain works and inspires new avenues for design in computer science and engineering This unique book is the first of its kind to introduce human memory and basic cognition in terms of physical circuits, beginning wit…
Gain a new perspective on how the brain works and inspires new avenues for design in computer science and engineering This unique book is the first of its kind to introduce human memory and basic cognition in terms of physical circuits, beginning wit…
TCP/IP Architecture, Design and Implementation in Linux
4
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design an…
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design an…
High Performance Parallel Database Processing and Grid Databases
4
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel d…
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel d…
Using Aspect-Oriented Programming for Trustworthy Software Development
3
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented pro…
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented pro…
Programming Java 2 Micro Edition for Symbian OS
4
Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain how to…
Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain how to…
XSLT 2.0 and XPath 2.0 Programmer's Reference
4
Combining coverage of both XSLT 2.0 and XPath 2.0, this book is the definitive reference to the final recommendation status versions of both specifications. The authors start by covering the concepts in XSLT and XPath, and then delve into elements, o…
Combining coverage of both XSLT 2.0 and XPath 2.0, this book is the definitive reference to the final recommendation status versions of both specifications. The authors start by covering the concepts in XSLT and XPath, and then delve into elements, o…
Cryptography and Public Key Infrastructure on the Internet
3
A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathemati…
A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathemati…
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
4
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a n…
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a n…
Sourcebook of ATM and IP Internetworking
3
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly…
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly…

Популярные авторы