зарубежная компьютерная литература
Praise from the Reviewers: «The practicality of the subject in a real-world situation distinguishes this book from others available on the market.» —Professor Behrouz Far, University of Calgary «This book could replace the computer organization texts…
Praise from the Reviewers: «The practicality of the subject in a real-world situation distinguishes this book from others available on the market.» —Professor Behrouz Far, University of Calgary «This book could replace the computer organization texts…
Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch Apple's iPhone is the hottest mobile device on the planet. More than one million iPhone 3G phones were sold in the first three …
Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch Apple's iPhone is the hottest mobile device on the planet. More than one million iPhone 3G phones were sold in the first three …
A Step-by-Step Guide to Verification of Digital Systems This practical book provides a step-by-step, interactive introduction to formal verification of systems and circuits. The book offers theoretical background and introduces the application of thr…
A Step-by-Step Guide to Verification of Digital Systems This practical book provides a step-by-step, interactive introduction to formal verification of systems and circuits. The book offers theoretical background and introduces the application of thr…
This is the first book to explain the language Unified Parallel C and its use. Authors El-Ghazawi, Carlson, and Sterling are among the developers of UPC, with close links with the industrial members of the UPC consortium. Their text covers background…
This is the first book to explain the language Unified Parallel C and its use. Authors El-Ghazawi, Carlson, and Sterling are among the developers of UPC, with close links with the industrial members of the UPC consortium. Their text covers background…
This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows …
This collaborative research project allows for fundamental advances not only in the understanding of the phenomena but also in the development of practical calculation methods that can be used by engineers. This collaborative research project allows …
A unified view of metaheuristics This book provides a complete background on metaheuristics and shows readers how to design and implement efficient algorithms to solve complex optimization problems across a diverse range of applications, from network…
A unified view of metaheuristics This book provides a complete background on metaheuristics and shows readers how to design and implement efficient algorithms to solve complex optimization problems across a diverse range of applications, from network…
The purpose of large-scale software architecture is to capture and describe practical representations to make development teams more effective. In this book the authors show how to utilise software architecture as a tool to guide the development inst…
The purpose of large-scale software architecture is to capture and describe practical representations to make development teams more effective. In this book the authors show how to utilise software architecture as a tool to guide the development inst…
Extending the scenario method beyond interface design, this important book shows developers how to design more effective systems by soliciting, analyzing, and elaborating stories from end-users Contributions from leading industry consultants and opin…
Extending the scenario method beyond interface design, this important book shows developers how to design more effective systems by soliciting, analyzing, and elaborating stories from end-users Contributions from leading industry consultants and opin…
Evolution of software has long been recognized as one of the most problematic and challenging areas in the field of software engineering, as evidenced by the high, often up to 60-80%, life-cycle costs attributed to this activity over the life of a so…
Evolution of software has long been recognized as one of the most problematic and challenging areas in the field of software engineering, as evidenced by the high, often up to 60-80%, life-cycle costs attributed to this activity over the life of a so…
This book covers the full development life cycle for professional GUI design in Java, from cost estimation and design to coding and testing. Focuses on building high quality industrial strength software in Java Ready-to-use source code is given throu…
This book covers the full development life cycle for professional GUI design in Java, from cost estimation and design to coding and testing. Focuses on building high quality industrial strength software in Java Ready-to-use source code is given throu…
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a t…
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a t…
One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and bus…
One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and bus…
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many …
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many …
In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text…
In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text…
Leading authorities deliver the commandments for designing high-speed networks There are no end of books touting the virtues of one or another high-speed networking technology, but until now, there were none offering networking professionals a framew…
Leading authorities deliver the commandments for designing high-speed networks There are no end of books touting the virtues of one or another high-speed networking technology, but until now, there were none offering networking professionals a framew…
The first how-to guide for online storage management with Windows 2000 In this book, expert Paul Massiglia first provides a clear tutorial on the principles of managed online storage and then walks you through the basics of how to manage your disks a…
The first how-to guide for online storage management with Windows 2000 In this book, expert Paul Massiglia first provides a clear tutorial on the principles of managed online storage and then walks you through the basics of how to manage your disks a…
To be competitive, service providers cannot customize every installation but must simultaneously offer services that meet a wide range of perceived customer needs. This guide shows commercial service providers and equipment vendors how to build compe…
To be competitive, service providers cannot customize every installation but must simultaneously offer services that meet a wide range of perceived customer needs. This guide shows commercial service providers and equipment vendors how to build compe…
Clustering is a vital methodology in the data storage world. Its goal is to maximize cost-effectiveness, availability, flexibility, and scalability. Clustering has changed considerably for the better due to Storage Area Networks, which provide access…
Clustering is a vital methodology in the data storage world. Its goal is to maximize cost-effectiveness, availability, flexibility, and scalability. Clustering has changed considerably for the better due to Storage Area Networks, which provide access…
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) mi…
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) mi…
The current Symbian Press list focuses very much on the small scale features of Symbian OS in a programming context. The Architecture Sourcebook is different. It's not a how-to book, it's a 'what and why' book. And because it names names as it unwind…
The current Symbian Press list focuses very much on the small scale features of Symbian OS in a programming context. The Architecture Sourcebook is different. It's not a how-to book, it's a 'what and why' book. And because it names names as it unwind…