bannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

Unauthorised Access. Physical Penetration Testing For IT Security Teams
5
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? Whil…
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? Whil…
Network Security Foundations. Technology Fundamentals for IT Success
3
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to i…
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to i…
Oracle Database Performance and Scalability. A Quantitative Approach
5
The innovative performance and scalability features with each newer edition of the Oracle database system can present challenges for users. This book teaches software developers and students how to effectively deal with Oracle performance and scalabi…
The innovative performance and scalability features with each newer edition of the Oracle database system can present challenges for users. This book teaches software developers and students how to effectively deal with Oracle performance and scalabi…
Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed
3
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E. Moreira…
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E. Moreira…
Complex-Valued Neural Networks. Advances and Applications
3
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applications Complex-valued neural networks is a rapidly developing neural network framework that utilizes complex arithmetic, exhibiting sp…
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applications Complex-valued neural networks is a rapidly developing neural network framework that utilizes complex arithmetic, exhibiting sp…
Public Key Cryptography. Applications and Attacks
3
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public ke…
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public ke…
Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation
5
A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web platforms have specific requirements that go beyond standard functionality; to meet such requirements, it's often necessary to dev…
A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web platforms have specific requirements that go beyond standard functionality; to meet such requirements, it's often necessary to dev…
Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists
5
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, …
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, …
Reversible Computing. Fundamentals, Quantum Computing, and Applications
5
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It …
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It …
Multimedia Information Extraction. Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
5
The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube) is driving a need not only for multimedia retrieval but also information extraction from and across media. Furthermore, i…
The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube) is driving a need not only for multimedia retrieval but also information extraction from and across media. Furthermore, i…
Functional Programming in C#. Classic Programming Techniques for Modern Projects
3
Take advantage of the growing trend in functional programming. C# is the number-one language used by .NET developers and one of the most popular programming languages in the world. It has many built-in functional programming features, but most are co…
Take advantage of the growing trend in functional programming. C# is the number-one language used by .NET developers and one of the most popular programming languages in the world. It has many built-in functional programming features, but most are co…
Data Mining. Concepts, Models, Methods, and Algorithms
5
This book reviews state-of-the-art methodologies and techniques for analyzing enormous quantities of raw data in high-dimensional data spaces, to extract new information for decision making. The goal of this book is to provide a single introductory s…
This book reviews state-of-the-art methodologies and techniques for analyzing enormous quantities of raw data in high-dimensional data spaces, to extract new information for decision making. The goal of this book is to provide a single introductory s…
Enterprise Software Architecture and Design. Entities, Services, and Resources
3
This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the «big picture». This book discusses SOA from the low-level perspective of middleware, various XML-…
This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the «big picture». This book discusses SOA from the low-level perspective of middleware, various XML-…
Discovering Knowledge in Data. An Introduction to Data Mining
4
The field of data mining lies at the confluence of predictive analytics, statistical analysis, and business intelligence. Due to the ever-increasing complexity and size of data sets and the wide range of applications in computer science, business, an…
The field of data mining lies at the confluence of predictive analytics, statistical analysis, and business intelligence. Due to the ever-increasing complexity and size of data sets and the wide range of applications in computer science, business, an…
Differential Evolution. Fundamentals and Applications in Electrical Engineering
5
Differential evolution is a very simple but very powerful stochastic optimizer. Since its inception, it has proved very efficient and robust in function optimization and has been applied to solve problems in many scientific and engineering fields. In…
Differential evolution is a very simple but very powerful stochastic optimizer. Since its inception, it has proved very efficient and robust in function optimization and has been applied to solve problems in many scientific and engineering fields. In…
Data Mining for Genomics and Proteomics. Analysis of Gene and Protein Expression Data
5
Data Mining for Genomics and Proteomics uses pragmatic examples and a complete case study to demonstrate step-by-step how biomedical studies can be used to maximize the chance of extracting new and useful biomedical knowledge from data. It is an exce…
Data Mining for Genomics and Proteomics uses pragmatic examples and a complete case study to demonstrate step-by-step how biomedical studies can be used to maximize the chance of extracting new and useful biomedical knowledge from data. It is an exce…
Fundamentals of Reliability Engineering. Applications in Multistage Interconnection Networks
5
This book presents fundamentals of reliability engineering with its applications in evaluating reliability of multistage interconnection networks. In the first part of the book, it introduces the concept of reliability engineering, elements of probab…
This book presents fundamentals of reliability engineering with its applications in evaluating reliability of multistage interconnection networks. In the first part of the book, it introduces the concept of reliability engineering, elements of probab…
Static Analysis of Software. The Abstract Interpretation
4
The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis. This book presents real examples of the formal techniques called «abstract interpretation» currently bein…
The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis. This book presents real examples of the formal techniques called «abstract interpretation» currently bein…
Design for Reliability. Information and Computer-Based Systems
4
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustnes…
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustnes…
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
4
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of s…
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of s…

Популярные авторы