bannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

Cybersecurity Essentials
3
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effecti…
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effecti…
About Face
4
The essential interaction design guide, fully revised and updated for the mobile age About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved the landscape of interaction design. This c…
The essential interaction design guide, fully revised and updated for the mobile age About Face: The Essentials of Interaction Design, Fourth Edition is the latest update to the book that shaped and evolved the landscape of interaction design. This c…
Foundations of Coding
3
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding m…
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their decoding m…
Networking Self-Teaching Guide
3
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find t…
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find t…
The Art of Rails
3
Ruby on Rails offers the ability to rapidly design and write high-quality code with elegance and maintainability. Written by an experienced web application developer, this book explains how to take good Rails code and turn it into beautiful Rails cod…
Ruby on Rails offers the ability to rapidly design and write high-quality code with elegance and maintainability. Written by an experienced web application developer, this book explains how to take good Rails code and turn it into beautiful Rails cod…
Speech Coding Algorithms
5
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
5
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
Insider Threats
4
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
Adobe Photoshop CS6 Top 100 Simplified Tips and Tricks
4
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and techniques. Filled with beyond-the-essentials techniques that show how to take your Photoshop skills to…
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and techniques. Filled with beyond-the-essentials techniques that show how to take your Photoshop skills to…
Requirements Modelling and Specification for Service Oriented Architecture
3
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here i…
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here i…
Microprocessor Theory and Applications with 68000/68020 and Pentium
4
A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Int…
A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Int…
Business Rules Management and Service Oriented Architecture
5
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Managing the Human Factor in Information Security
3
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
Grammars with Context Conditions and Their Applications
5
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
Architecture-Independent Programming for Wireless Sensor Networks
5
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
Game Character Creation with Blender and Unity
3
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
Relational Database Index Design and the Optimizers
5
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receive…
Improve the performance of relational databases with indexes designed for today's hardware Over the last few years, hardware and software have advanced beyond all recognition, so it's hardly surprising that relational database performance now receive…
Data Mining and Business Analytics with R
3
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Looking Back and Going Forward in IT
3
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
Multimedia Broadcasting and Multicasting in Mobile Networks
5
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…

Популярные авторы