зарубежная компьютерная литература
Top-notch advice on adopting DSL DSL is exploding, with fifteen million fast Internet connections in 2001 and probably forty million more by 2003. The editors of DSL Prime, the weekly «industry bible,» brief you on exactly what you need to know to pu…
Top-notch advice on adopting DSL DSL is exploding, with fifteen million fast Internet connections in 2001 and probably forty million more by 2003. The editors of DSL Prime, the weekly «industry bible,» brief you on exactly what you need to know to pu…
Discover how to utilize the latest WAP technologies to meet your business needs With wireless services rapidly exploding worldwide, WAP is becoming the most talked about standard for wireless applications. In this accessible book, mobility experts St…
Discover how to utilize the latest WAP technologies to meet your business needs With wireless services rapidly exploding worldwide, WAP is becoming the most talked about standard for wireless applications. In this accessible book, mobility experts St…
See how the Palm Computing platform can enhance your company's business. With the dramatic increase in the use of Palm enterprise applications in business, you may be wondering how this new technology will impact your organization. Handheld devices h…
See how the Palm Computing platform can enhance your company's business. With the dramatic increase in the use of Palm enterprise applications in business, you may be wondering how this new technology will impact your organization. Handheld devices h…
Get a jump start on deploying next-generation Internet technologies in your business The rapid growth of wireless Internet technologies is changing not only the way we do business but also the way we must think about designing wireless and Web applic…
Get a jump start on deploying next-generation Internet technologies in your business The rapid growth of wireless Internet technologies is changing not only the way we do business but also the way we must think about designing wireless and Web applic…
ZBrush's popularity is exploding giving more CG artists the power to create stunning digital art with a distinctively fine art feel. ZBrush Character Creation: Advanced Digital Sculpting is the must-have guide to creating highly detailed, lush, organ…
ZBrush's popularity is exploding giving more CG artists the power to create stunning digital art with a distinctively fine art feel. ZBrush Character Creation: Advanced Digital Sculpting is the must-have guide to creating highly detailed, lush, organ…
The only complete technical guide to building integrated business systems using the convergent architecture approach In his groundbreaking Business Engineering with Object Technology (0-471-04521-7), David Taylor introduced the concept of convergent …
The only complete technical guide to building integrated business systems using the convergent architecture approach In his groundbreaking Business Engineering with Object Technology (0-471-04521-7), David Taylor introduced the concept of convergent …
Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to b…
Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to b…
"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site look…
"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site look…
Here's the book you need to prepare for CompTIA's i-Net+ Exam. This Sybex Study Guide provides: Full coverage of every exam objective Practical information on network hardware Hundreds of challenging review questions, in the book and on the CD Leadin…
Here's the book you need to prepare for CompTIA's i-Net+ Exam. This Sybex Study Guide provides: Full coverage of every exam objective Practical information on network hardware Hundreds of challenging review questions, in the book and on the CD Leadin…
Get ready to pass the CISSP exam and earn your certification with this advanced test guide Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP e…
Get ready to pass the CISSP exam and earn your certification with this advanced test guide Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP e…
Here's the book you need to prepare for CompTIA's updated Linux+ exam, #XK0-002. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach…
Here's the book you need to prepare for CompTIA's updated Linux+ exam, #XK0-002. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach…
Here's the book you need to prepare for CompTIA's Linux+ exam. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned S…
Here's the book you need to prepare for CompTIA's Linux+ exam. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned S…
Written especially for advanced beginners and intermediate users, this book offers quick fixes for anyone bedeviled by faulty formulas, failed formatting, printer purgatory, and other perplexing Excel problems Offers three types of fixes: Escape in U…
Written especially for advanced beginners and intermediate users, this book offers quick fixes for anyone bedeviled by faulty formulas, failed formatting, printer purgatory, and other perplexing Excel problems Offers three types of fixes: Escape in U…
SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create Organized exactly like the bestselling The CISSP Prep Guide…
SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create Organized exactly like the bestselling The CISSP Prep Guide…
[b]Move beyond the checklist and fully protect yourself from third-party cybersecurity risk [/b]
Over the last nearly ten years there have been hundreds of big-name organizations in every sector subjected to a public breach due to a vendor. The recog…
[b]Move beyond the checklist and fully protect yourself from third-party cybersecurity risk [/b]
Over the last nearly ten years there have been hundreds of big-name organizations in every sector subjected to a public breach due to a vendor. The recog…
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and incl…
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and incl…
[b]Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.[/b][b][/b]The [i]Tribe of Hackers [/i]team is back with a new guide packed with insights from dozens of the world’s leading Red Team security spec…
[b]Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.[/b][b][/b]The [i]Tribe of Hackers [/i]team is back with a new guide packed with insights from dozens of the world’s leading Red Team security spec…