bannerbanner

зарубежная компьютерная литература

Effective GUI Testing Automation. Developing an Automated GUI Testing Tool
5
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own tru…
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own tru…
Hack Attacks Testing. How to Conduct Your Own Security Audit
4
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible…
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible…
Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers
4
Web 2.0 may be an elusive concept, but one thing is certain: using the Web as merely a means of retrieving and displaying information is history. Today?s Web is immediate, interactive, innovative. It is user-controlled and community-driven. Organizat…
Web 2.0 may be an elusive concept, but one thing is certain: using the Web as merely a means of retrieving and displaying information is history. Today?s Web is immediate, interactive, innovative. It is user-controlled and community-driven. Organizat…
Network Services Investment Guide. Maximizing ROI in Uncertain Times
4
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to avoid r…
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to avoid r…
Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems
5
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and systems, and illustrated with a running case study Enable…
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and systems, and illustrated with a running case study Enable…
Unauthorised Access. Physical Penetration Testing For IT Security Teams
5
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? Whil…
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? Whil…
Network Security Foundations. Technology Fundamentals for IT Success
3
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to i…
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to i…
Гений наносит ответный удар. Хидео Кодзима и эволюция METAL GEAR
4
Продолжение книги «Кодзима – гений». Хидео Кодзима раздвигает границы возможного! Книга «Кодзима – гений» описывала события начиная с молодости Кодзимы и заканчивая разработкой METAL GEAR SOLID 2: SUBSTANCE. В этом продолжении Терри Вулф познакомит в…
Продолжение книги «Кодзима – гений». Хидео Кодзима раздвигает границы возможного! Книга «Кодзима – гений» описывала события начиная с молодости Кодзимы и заканчивая разработкой METAL GEAR SOLID 2: SUBSTANCE. В этом продолжении Терри Вулф познакомит в…
Oracle Database Performance and Scalability. A Quantitative Approach
5
The innovative performance and scalability features with each newer edition of the Oracle database system can present challenges for users. This book teaches software developers and students how to effectively deal with Oracle performance and scalabi…
The innovative performance and scalability features with each newer edition of the Oracle database system can present challenges for users. This book teaches software developers and students how to effectively deal with Oracle performance and scalabi…
Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed
3
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E. Moreira…
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E. Moreira…
Complex-Valued Neural Networks. Advances and Applications
3
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applications Complex-valued neural networks is a rapidly developing neural network framework that utilizes complex arithmetic, exhibiting sp…
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applications Complex-valued neural networks is a rapidly developing neural network framework that utilizes complex arithmetic, exhibiting sp…
Public Key Cryptography. Applications and Attacks
3
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public ke…
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public ke…
Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation
5
A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web platforms have specific requirements that go beyond standard functionality; to meet such requirements, it's often necessary to dev…
A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web platforms have specific requirements that go beyond standard functionality; to meet such requirements, it's often necessary to dev…
Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists
5
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, …
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, …
Reversible Computing. Fundamentals, Quantum Computing, and Applications
5
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It …
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It …
Multimedia Information Extraction. Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
5
The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube) is driving a need not only for multimedia retrieval but also information extraction from and across media. Furthermore, i…
The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube) is driving a need not only for multimedia retrieval but also information extraction from and across media. Furthermore, i…
Functional Programming in C#. Classic Programming Techniques for Modern Projects
3
Take advantage of the growing trend in functional programming. C# is the number-one language used by .NET developers and one of the most popular programming languages in the world. It has many built-in functional programming features, but most are co…
Take advantage of the growing trend in functional programming. C# is the number-one language used by .NET developers and one of the most popular programming languages in the world. It has many built-in functional programming features, but most are co…
Data Mining. Concepts, Models, Methods, and Algorithms
5
This book reviews state-of-the-art methodologies and techniques for analyzing enormous quantities of raw data in high-dimensional data spaces, to extract new information for decision making. The goal of this book is to provide a single introductory s…
This book reviews state-of-the-art methodologies and techniques for analyzing enormous quantities of raw data in high-dimensional data spaces, to extract new information for decision making. The goal of this book is to provide a single introductory s…
Enterprise Software Architecture and Design. Entities, Services, and Resources
3
This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the «big picture». This book discusses SOA from the low-level perspective of middleware, various XML-…
This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the «big picture». This book discusses SOA from the low-level perspective of middleware, various XML-…
Discovering Knowledge in Data. An Introduction to Data Mining
4
The field of data mining lies at the confluence of predictive analytics, statistical analysis, and business intelligence. Due to the ever-increasing complexity and size of data sets and the wide range of applications in computer science, business, an…
The field of data mining lies at the confluence of predictive analytics, statistical analysis, and business intelligence. Due to the ever-increasing complexity and size of data sets and the wide range of applications in computer science, business, an…

Популярные авторы