bannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

The Information Society
5
What are we to make of the information society? Many prominent theorists have argued it to be the most profound and comprehensive transformation of economy, culture and politics since the rise of the industrial way of life in the 18th century. Some s…
What are we to make of the information society? Many prominent theorists have argued it to be the most profound and comprehensive transformation of economy, culture and politics since the rise of the industrial way of life in the 18th century. Some s…
Content Distribution Networks
3
Content distribution networks (CDNs) are the most promising new techniques for coping with the huge and swiftly growing volume of Internet traffic. In essence, CDNs are groups of proxy-servers located at strategic points around the Internet and arran…
Content distribution networks (CDNs) are the most promising new techniques for coping with the huge and swiftly growing volume of Internet traffic. In essence, CDNs are groups of proxy-servers located at strategic points around the Internet and arran…
Domain Architectures
5
Domain Architectures is a comprehensive catalog of the domain architectures essential to software developers using object-oriented technology and UML to solve real-life problems. Providing a unique top-down view of systems, the book also provides qui…
Domain Architectures is a comprehensive catalog of the domain architectures essential to software developers using object-oriented technology and UML to solve real-life problems. Providing a unique top-down view of systems, the book also provides qui…
Internet Communications Using SIP
5
This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place. –Henning Schulzrinne, Professor, Columbia University Since its birth in 1996, Session Initiation…
This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place. –Henning Schulzrinne, Professor, Columbia University Since its birth in 1996, Session Initiation…
MCSA Windows Server 2016 Study Guide: Exam 70-742
5
Comprehensive preparation for the final MCSA exam, updated for Windows Server 2016 MCSA Windows Server 2016 Study Guide: Exam 70-742 is the ultimate preparation resource for the third and final MCSA exam. Tightly focused and highly relevant, this gui…
Comprehensive preparation for the final MCSA exam, updated for Windows Server 2016 MCSA Windows Server 2016 Study Guide: Exam 70-742 is the ultimate preparation resource for the third and final MCSA exam. Tightly focused and highly relevant, this gui…
Storage Area Network Essentials
5
The inside scoop on a leading-edge data storage technology The rapid growth of e-commerce and the need to have all kinds of applications operating at top speed at the same time, all on a 24/7 basis while connected to the Internet, is overwhelming tra…
The inside scoop on a leading-edge data storage technology The rapid growth of e-commerce and the need to have all kinds of applications operating at top speed at the same time, all on a 24/7 basis while connected to the Internet, is overwhelming tra…
Securing SCADA Systems
3
Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural g…
Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural g…
Secrets and Lies
4
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer net…
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer net…
Blade Servers and Virtualization
3
Blade server systems and virtualization are key building blocks for Next Generation Enterprise Data centers Blades offer modular, pre-wired, ultra high-density servers (up to 10x traditional servers) with shared components (power, cooling, switches) …
Blade server systems and virtualization are key building blocks for Next Generation Enterprise Data centers Blades offer modular, pre-wired, ultra high-density servers (up to 10x traditional servers) with shared components (power, cooling, switches) …
Inside Symbian SQL
4
This is the definitive guide for Symbian C++ developers looking to use Symbian SQL in applications or system software. Since Symbian SQL and SQLite are relatively new additions to the Symbian platform, Inside Symbian SQL begins with an introduction t…
This is the definitive guide for Symbian C++ developers looking to use Symbian SQL in applications or system software. Since Symbian SQL and SQLite are relatively new additions to the Symbian platform, Inside Symbian SQL begins with an introduction t…
PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide
3
The ultimate study package for the new PMI-ACP exam The PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide is an all-in-one package for comprehensive exam preparation. This up-to-date guide is fully aligned with the la…
The ultimate study package for the new PMI-ACP exam The PMI-ACP Project Management Institute Agile Certified Practitioner Exam Study Guide is an all-in-one package for comprehensive exam preparation. This up-to-date guide is fully aligned with the la…
Integrating Service Level Agreements
5
Service level agreements (SLAs) offer service providers a way to distinguish themselves from their competitors in today's volatile, hypercompetitive market. This book offers an innovative approach that takes full advantage of current interface, autom…
Service level agreements (SLAs) offer service providers a way to distinguish themselves from their competitors in today's volatile, hypercompetitive market. This book offers an innovative approach that takes full advantage of current interface, autom…
CCNA Security Study Guide
5
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare …
Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare …
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide
4
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With…
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With…
Business Rules Management and Service Oriented Architecture
5
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Business rules management system (BRMS) is a software tools that work alongside enterprise IT applications. It enables enterprises to automate decision-making processes typically consisting of separate business rules authoring and rules execution app…
Information Storage and Management
3
The spiraling growth of digital information makes the ISM book a «must have» addition to your IT reference library. This exponential growth has driven information management technology to new levels of sophistication and complexity, exposing a skills…
The spiraling growth of digital information makes the ISM book a «must have» addition to your IT reference library. This exponential growth has driven information management technology to new levels of sophistication and complexity, exposing a skills…
CompTIA Network+ Review Guide
4
Essential last-minute review aid for the updated CompTIA Network+ Exam N10-007 CompTIA Network+ Review Guide Exam N10-007, 4th Edition, is your ideal study companion for preparing for the CompTIA Network+ exam (N10-007). Organized by exam objectives,…
Essential last-minute review aid for the updated CompTIA Network+ Exam N10-007 CompTIA Network+ Review Guide Exam N10-007, 4th Edition, is your ideal study companion for preparing for the CompTIA Network+ exam (N10-007). Organized by exam objectives,…
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
5
Examines how risk management security technologies must prevent virus and computer attacks, as well as providing insurance and processes for natural disasters such as fire, floods, tsunamis, terrorist attacks Addresses four main topics: the risk (sev…
Examines how risk management security technologies must prevent virus and computer attacks, as well as providing insurance and processes for natural disasters such as fire, floods, tsunamis, terrorist attacks Addresses four main topics: the risk (sev…
Managing the Human Factor in Information Security
3
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a sec…
Refactoring in Large Software Projects
3
Large Refactorings looks at methods of establish design improvements as an important and independent activity during development of software, and will help to ensure that software continues to adapt, improve and remain easy to read and modify without…
Large Refactorings looks at methods of establish design improvements as an important and independent activity during development of software, and will help to ensure that software continues to adapt, improve and remain easy to read and modify without…

Популярные авторы