bannerbanner

зарубежная компьютерная литература

Google Apps For Dummies
4
Google Apps are Web-based, low-cost (or free!) office productivity tools that do everything those expensive applications do – and you can access them from any computer with an Internet connection. Google Apps For Dummies boosts your «app-titude» by g…
Google Apps are Web-based, low-cost (or free!) office productivity tools that do everything those expensive applications do – and you can access them from any computer with an Internet connection. Google Apps For Dummies boosts your «app-titude» by g…
TCP / IP For Dummies
5
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dumm…
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dumm…
SAP NetWeaver For Dummies
5
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with S…
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with S…
Photoshop CS3 Bible
4
Get the book you need to succeed in any Photoshop endeavor – Photoshop CS3 Bible. In this totally updated edition to the international bestseller, the authors show you how to master every aspect of Photoshop – from image-editing basics to new techniq…
Get the book you need to succeed in any Photoshop endeavor – Photoshop CS3 Bible. In this totally updated edition to the international bestseller, the authors show you how to master every aspect of Photoshop – from image-editing basics to new techniq…
Rootkits For Dummies
4
A rootkit is a type of malicious software that gives the hacker «root» or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits all…
A rootkit is a type of malicious software that gives the hacker «root» or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits all…
Adobe AIR Bible
5
Adobe Integrated Runtime (AIR) lets you use scripting languages you already know and frees you from the dull parts of development—so you can focus on creating exciting and cost-saving application user interfaces using Flash, Flex, and JavaScript. Fin…
Adobe Integrated Runtime (AIR) lets you use scripting languages you already know and frees you from the dull parts of development—so you can focus on creating exciting and cost-saving application user interfaces using Flash, Flex, and JavaScript. Fin…
Technical Writing for Teams. The STREAM Tools Handbook
5
A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need a pr…
A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need a pr…
Handbook of eID Security. Concepts, Practical Experiences, Technologies
3
In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as for se…
In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as for se…
The Joy of SOX
4
The Sarbanes-Oxley Act (SOX) was passed in 2002 in response to a series of high-profile corporate scandals and requires that public companies implement internal controls over financial reporting, operations, and assets; these controls depend heavily …
The Sarbanes-Oxley Act (SOX) was passed in 2002 in response to a series of high-profile corporate scandals and requires that public companies implement internal controls over financial reporting, operations, and assets; these controls depend heavily …
Computer System Design. System-on-Chip
5
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge…
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge…
Patterns for Computer-Mediated Interaction
5
Written by well-respected experts, this how-to guide provides patterns for the design of human computer human interaction (HCHI). An increasing number of applications are currently designed for use by more than one user, eg: multi-player games, inter…
Written by well-respected experts, this how-to guide provides patterns for the design of human computer human interaction (HCHI). An increasing number of applications are currently designed for use by more than one user, eg: multi-player games, inter…
IPv6 Deployment and Management
3
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including…
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including…
Information Processing by Biochemical Systems. Neural Network-Type Configurations
4
A Research-Driven Resource on Building Biochemical Systems to Perform Information Processing Functions Information Processing by Biochemical Systems describes fully delineated biochemical systems, organized as neural network–type assemblies. It expla…
A Research-Driven Resource on Building Biochemical Systems to Perform Information Processing Functions Information Processing by Biochemical Systems describes fully delineated biochemical systems, organized as neural network–type assemblies. It expla…
Discovering Requirements. How to Specify Products and Services
5
This book is not only of practical value. It's also a lot of fun to read. Michael Jackson, The Open University. Do you need to know how to create good requirements? Discovering Requirements offers a set of simple, robust, and effective cognitive tool…
This book is not only of practical value. It's also a lot of fun to read. Michael Jackson, The Open University. Do you need to know how to create good requirements? Discovering Requirements offers a set of simple, robust, and effective cognitive tool…
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
5
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a n…
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a n…
Mastering VMware vSphere 6.7
3
Master your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6.7 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this…
Master your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6.7 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this…
Networking Self-Teaching Guide
5
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find t…
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find t…
Designing Security Architecture Solutions
5
The first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with …
The first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with …
Cybersecurity Essentials
5
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effecti…
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effecti…
About Face
5
The essential interaction design guide, fully revised and updated for the mobile age About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved the landscape of interaction design. This c…
The essential interaction design guide, fully revised and updated for the mobile age About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved the landscape of interaction design. This c…

Популярные авторы