зарубежная компьютерная литература
Methods for managing complex software construction following the practices, principles and patterns of Domain-Driven Design with code examples in C# This book presents the philosophy of Domain-Driven Design (DDD) in a down-to-earth and practical mann…
Methods for managing complex software construction following the practices, principles and patterns of Domain-Driven Design with code examples in C# This book presents the philosophy of Domain-Driven Design (DDD) in a down-to-earth and practical mann…
Fill the gap between planning and doing with SSIS 2014 The 2014 release of Microsoft's SQL Server Integration Services provides enhancements for managing extraction, transformation, and load operations, plus expanded in-memory capabilities, improved …
Fill the gap between planning and doing with SSIS 2014 The 2014 release of Microsoft's SQL Server Integration Services provides enhancements for managing extraction, transformation, and load operations, plus expanded in-memory capabilities, improved …
Get in the game of developing successful apps for the iPad Designing for the iPad presents unique challenges for developers and requires an entirely different mindset of elements to consider when creating apps. Written by a highly successful iPad sof…
Get in the game of developing successful apps for the iPad Designing for the iPad presents unique challenges for developers and requires an entirely different mindset of elements to consider when creating apps. Written by a highly successful iPad sof…
Learn to build fast and scalable software in JavaScript with Node.js Node.js is a powerful and popular new framework for writing scalable network programs using JavaScript. This no nonsense book begins with an overview of Node.js and then quickly div…
Learn to build fast and scalable software in JavaScript with Node.js Node.js is a powerful and popular new framework for writing scalable network programs using JavaScript. This no nonsense book begins with an overview of Node.js and then quickly div…
A complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you’re a database administrator or developer, you’ll first get up to …
A complete guide to Pentaho Kettle, the Pentaho Data lntegration toolset for ETL This practical book is a complete guide to installing, configuring, and managing Pentaho Kettle. If you’re a database administrator or developer, you’ll first get up to …
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of wo…
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of wo…
Covering the latest VMware vSphere software, an essential book aimed at solving vSphere performance problems before they happen VMware vSphere is the industry's most widely deployed virtualization solution. However, if you improperly deploy vSphere, …
Covering the latest VMware vSphere software, an essential book aimed at solving vSphere performance problems before they happen VMware vSphere is the industry's most widely deployed virtualization solution. However, if you improperly deploy vSphere, …
A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. W…
A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. W…
The eagerly anticipated new edition of the bestselling introduction to x86 assembly language The long-awaited third edition of this bestselling introduction to assembly language has been completely rewritten to focus on 32-bit protected-mode Linux an…
The eagerly anticipated new edition of the bestselling introduction to x86 assembly language The long-awaited third edition of this bestselling introduction to assembly language has been completely rewritten to focus on 32-bit protected-mode Linux an…
Turn your app ideas into a money-making goldmine More than 10 billion apps have been downloaded from Apple's AppStore and with the right combination of original ideas, great features, solid coding, unique designs, and savvy marketing, your apps could…
Turn your app ideas into a money-making goldmine More than 10 billion apps have been downloaded from Apple's AppStore and with the right combination of original ideas, great features, solid coding, unique designs, and savvy marketing, your apps could…
The Basics of Computer Arithmetic Made Enjoyable and Accessible-with a Special Program Included for Hands-on Learning «The combination of this book and its associated virtual computer is fantastic! Experience over the last fifty years has shown me th…
The Basics of Computer Arithmetic Made Enjoyable and Accessible-with a Special Program Included for Hands-on Learning «The combination of this book and its associated virtual computer is fantastic! Experience over the last fifty years has shown me th…
Two Microsoft Access MVPs show how you can become an Access power user Microsoft Access is the world’s leading database system, with millions of users and hundreds of thousands of developers. The best practices, tips, and techniques in this book can …
Two Microsoft Access MVPs show how you can become an Access power user Microsoft Access is the world’s leading database system, with millions of users and hundreds of thousands of developers. The best practices, tips, and techniques in this book can …
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual crim…
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual crim…
8 books in 1- your key to QuickBooks 2007 success! Your one-stop guide to managing your small business finances more efficiently QuickBooks is the leading accounting program for small businesses, and this book gives you a handy reference to all its p…
8 books in 1- your key to QuickBooks 2007 success! Your one-stop guide to managing your small business finances more efficiently QuickBooks is the leading accounting program for small businesses, and this book gives you a handy reference to all its p…
Best practices, practical advice, and design ideas for successful ecommerce search A glaring gap has existed in the market for a resource that offers a comprehensive, actionable design patterns and design strategies for ecommerce search—but no longer…
Best practices, practical advice, and design ideas for successful ecommerce search A glaring gap has existed in the market for a resource that offers a comprehensive, actionable design patterns and design strategies for ecommerce search—but no longer…
Covers the new features, tools, and technologies in Office 2003 and demonstrates how developers can extend, enhance, and customize the suite using VisualBasic for Applications (VBA) More than 800 pages of clear and friendly For Dummies advice and ins…
Covers the new features, tools, and technologies in Office 2003 and demonstrates how developers can extend, enhance, and customize the suite using VisualBasic for Applications (VBA) More than 800 pages of clear and friendly For Dummies advice and ins…
Presenting updated coverage of openSUSE 11.0 and SUSE Linux Enterprise Server 11.0, this reference is written by Novell insiders and boasts the most up-to-date information available Topics covered include the openSUSE project, command line programs a…
Presenting updated coverage of openSUSE 11.0 and SUSE Linux Enterprise Server 11.0, this reference is written by Novell insiders and boasts the most up-to-date information available Topics covered include the openSUSE project, command line programs a…
At the end of 2004, more than 600,000 people had received CompTIA's vendor-neutral A+ certification, a key credential for anyone pursuing a career as a computer technician This competitively priced new guide offers seven minibooks and 1,000+ pages co…
At the end of 2004, more than 600,000 people had received CompTIA's vendor-neutral A+ certification, a key credential for anyone pursuing a career as a computer technician This competitively priced new guide offers seven minibooks and 1,000+ pages co…
This comprehensive guide to creating fillable forms with the latest release of Adobe Acrobat is packed with real-world insights and techniques gained from daily use of Adobe Acrobat and Adobe LiveCycle Designer under business deadline situations. You…
This comprehensive guide to creating fillable forms with the latest release of Adobe Acrobat is packed with real-world insights and techniques gained from daily use of Adobe Acrobat and Adobe LiveCycle Designer under business deadline situations. You…
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehens…
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehens…





















