зарубежная компьютерная литература
Step into the future with AI The term «Artificial Intelligence» has been around since the 1950s, but a lot has changed since then. Today, AI is referenced in the news, books, movies, and TV shows, and the exact definition is often misinterpreted. Art…
Step into the future with AI The term «Artificial Intelligence» has been around since the 1950s, but a lot has changed since then. Today, AI is referenced in the news, books, movies, and TV shows, and the exact definition is often misinterpreted. Art…
With the idea of “deep learning” having now become the key to this new generation of solutions, major technological players in the business intelligence sector have taken an interest in the application of Big Data. In this book, the author explores t…
With the idea of “deep learning” having now become the key to this new generation of solutions, major technological players in the business intelligence sector have taken an interest in the application of Big Data. In this book, the author explores t…
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, technique…
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, technique…
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know. The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identify…
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know. The Primer explains the knowledge tested in the Accredited Symbian Developer exam, identify…
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Micr…
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Micr…
This book is insightful and thought-provoking for even the most seasoned SAP BW individual. —Richard M. Dunning, Chair, American SAP Users Group Written by the leading experts in the field, this comprehensive guide shows you how to implement the SAP …
This book is insightful and thought-provoking for even the most seasoned SAP BW individual. —Richard M. Dunning, Chair, American SAP Users Group Written by the leading experts in the field, this comprehensive guide shows you how to implement the SAP …
Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or the …
Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or the …
A thorough update to the industry standard for designing, developing, and deploying data warehouse and business intelligence systems The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle Toolkit …
A thorough update to the industry standard for designing, developing, and deploying data warehouse and business intelligence systems The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle Toolkit …
Information systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves apar…
Information systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves apar…
For 200 years, industry mastered iron, fire, strength and energy. Today, electronics shapes our everyday objects, integrating chips: computers, phones, keys, games, household appliances, etc. Data, software and calculation frame the conduct of humank…
For 200 years, industry mastered iron, fire, strength and energy. Today, electronics shapes our everyday objects, integrating chips: computers, phones, keys, games, household appliances, etc. Data, software and calculation frame the conduct of humank…
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users…
Gain a new perspective on how the brain works and inspires new avenues for design in computer science and engineering This unique book is the first of its kind to introduce human memory and basic cognition in terms of physical circuits, beginning wit…
Gain a new perspective on how the brain works and inspires new avenues for design in computer science and engineering This unique book is the first of its kind to introduce human memory and basic cognition in terms of physical circuits, beginning wit…
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design an…
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design an…
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel d…
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel d…
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented pro…
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented pro…
Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain how to…
Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain how to…
Combining coverage of both XSLT 2.0 and XPath 2.0, this book is the definitive reference to the final recommendation status versions of both specifications. The authors start by covering the concepts in XSLT and XPath, and then delve into elements, o…
Combining coverage of both XSLT 2.0 and XPath 2.0, this book is the definitive reference to the final recommendation status versions of both specifications. The authors start by covering the concepts in XSLT and XPath, and then delve into elements, o…
A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathemati…
A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathemati…
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a n…
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a n…
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly…
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly…