bannerbannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

The Art of Rails
0
Ruby on Rails offers the ability to rapidly design and write high-quality code with elegance and maintainability. Written by an experienced web application developer, this book explains how to take good Rails code and turn it into beautiful Rails cod…
Ruby on Rails offers the ability to rapidly design and write high-quality code with elegance and maintainability. Written by an experienced web application developer, this book explains how to take good Rails code and turn it into beautiful Rails cod…
Speech Coding Algorithms
0
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and pres…
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
0
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
Insider Threats
0
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information …
Adobe Photoshop CS6 Top 100 Simplified Tips and Tricks
0
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and techniques. Filled with beyond-the-essentials techniques that show how to take your Photoshop skills to…
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and techniques. Filled with beyond-the-essentials techniques that show how to take your Photoshop skills to…
Requirements Modelling and Specification for Service Oriented Architecture
0
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here i…
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting specifications. Bringing together all the techniques needed by the modern software developer, here i…
Microprocessor Theory and Applications with 68000/68020 and Pentium
0
A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Int…
A self-contained introduction to microprocessor theory and applications This book presents the fundamental concepts of assembly language programming and system design associated with typical microprocessors, such as the Motorola MC68000/68020 and Int…
Business Rules Management and Service Oriented Architecture
0
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Managing the Human Factor in Information Security
0
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
Grammars with Context Conditions and Their Applications
0
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
The essential guide to grammars with context conditions This advanced computer science book systematically and compactly summarizes the current knowledge about grammars with context conditions-an important area of formal language theory. According to…
Game Character Creation with Blender and Unity
0
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
A complete guide to creating usable, realistic game characters with two powerful tools Creating viable game characters requires a combination of skills. This book teaches game creators how to create usable, realistic game assets using the power of an…
Data Mining and Business Analytics with R
0
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Collecting, analyzing, and extracting valuable information from a large amount of data requires easily accessible, robust, computational and analytical tools. Data Mining and Business Analytics with R utilizes the open source software R for the analy…
Looking Back and Going Forward in IT
0
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of compan…
Programming PC Connectivity Applications for Symbian OS
0
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide desig…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide desig…
Department of Defense Sponsored Information Security Research
0
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to…
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to…
Implementing 802.1X Security Solutions for Wired and Wireless Networks
0
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x …
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x …
Aligning Business and IT with Metadata
0
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance. The author Hans Wegener reveals how metadata can be used to …
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage risk and ensure regulatory compliance. The author Hans Wegener reveals how metadata can be used to …
Arithmetic and Logic in Computer Systems
0
Arithmetic and Logic in Computer Systems provides a useful guide to a fundamental subject of computer science and engineering. Algorithms for performing operations like addition, subtraction, multiplication, and division in digital computer systems a…
Arithmetic and Logic in Computer Systems provides a useful guide to a fundamental subject of computer science and engineering. Algorithms for performing operations like addition, subtraction, multiplication, and division in digital computer systems a…
Advanced Computer Architecture and Parallel Processing
0
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word…
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word…
Micro, Nanosystems and Systems on Chips
0
Micro and nanosystems represent a major scientific and technological challenge, with actual and potential applications in almost all fields of the human activity. The aim of the present book is to present how concepts from dynamical control systems (…
Micro and nanosystems represent a major scientific and technological challenge, with actual and potential applications in almost all fields of the human activity. The aim of the present book is to present how concepts from dynamical control systems (…

Популярные авторы