зарубежная компьютерная литература
Essential review for the PHR/SPHR exams, aligned with the updated HRBoK™ PHR/SPHR Professional in Human Resources Certification Review Guide is the ideal companion to the PHR/SPHR Study Guide, Fifth Edition, and PHR/SPHR Deluxe Study Guide, Second Ed…
Essential review for the PHR/SPHR exams, aligned with the updated HRBoK™ PHR/SPHR Professional in Human Resources Certification Review Guide is the ideal companion to the PHR/SPHR Study Guide, Fifth Edition, and PHR/SPHR Deluxe Study Guide, Second Ed…
A novel approach to decision engineering, with a verified framework for modeling human reasoning Soft Computing Evaluation Logic provides an in-depth examination of evaluation decision problems and presents comprehensive guidance toward the use of th…
A novel approach to decision engineering, with a verified framework for modeling human reasoning Soft Computing Evaluation Logic provides an in-depth examination of evaluation decision problems and presents comprehensive guidance toward the use of th…
Enjoy the top social media sites with ease and security Done correctly, social media is a way to connect friends, family, and the world while still maintaining security and privacy. Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition …
Enjoy the top social media sites with ease and security Done correctly, social media is a way to connect friends, family, and the world while still maintaining security and privacy. Facebook, Twitter, & Instagram For Seniors For Dummies, 3rd Edition …
A comprehensive collection of influential articles from one of IEEE Computer magazine’s most popular columns This book is a compendium of extended and revised publications that have appeared in the “Software Technologies” column of IEEE Computer maga…
A comprehensive collection of influential articles from one of IEEE Computer magazine’s most popular columns This book is a compendium of extended and revised publications that have appeared in the “Software Technologies” column of IEEE Computer maga…
The use of digital information and communication technologies would be the traces of a social acceptability of the exploitation of all data, in the context of negotiations of uses. This is the reason why the users present themselves actors and contri…
The use of digital information and communication technologies would be the traces of a social acceptability of the exploitation of all data, in the context of negotiations of uses. This is the reason why the users present themselves actors and contri…
This book will present a complete modeling of the human psychic system that allows to generate the thoughts in a strictly organizational approach that mixes a rising and falling approach. The model will present the architecture of the psychic system …
This book will present a complete modeling of the human psychic system that allows to generate the thoughts in a strictly organizational approach that mixes a rising and falling approach. The model will present the architecture of the psychic system …
Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its th…
Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its th…
This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, met…
This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, met…
Technology is more and more present in our lives, which is a clear advance, but also a danger, especially among the youngest people, since they can fall into what is called CyberAddiction.
This has become a reality today, a health problem that did n…
Technology is more and more present in our lives, which is a clear advance, but also a danger, especially among the youngest people, since they can fall into what is called CyberAddiction.
This has become a reality today, a health problem that did n…
In-depth instruction and practical techniques for building with the BeagleBone embedded Linux platform Exploring BeagleBone is a hands-on guide to bringing gadgets, gizmos, and robots to life using the popular BeagleBone embedded Linux platform. Comp…
In-depth instruction and practical techniques for building with the BeagleBone embedded Linux platform Exploring BeagleBone is a hands-on guide to bringing gadgets, gizmos, and robots to life using the popular BeagleBone embedded Linux platform. Comp…
With the current advances in technology innovation, the field of medicine and healthcare is rapidly expanding and, as a result, many different areas of human health diagnostics, treatment and care are emerging. Wireless technology is getting faster a…
With the current advances in technology innovation, the field of medicine and healthcare is rapidly expanding and, as a result, many different areas of human health diagnostics, treatment and care are emerging. Wireless technology is getting faster a…
Originally published in 1997 and now available as an ebook. The first book on ‘the most profitable company on earth’, by the bestselling author of Virgin King.This edition does not include illustrations.Intel has been dubbed the most powerful chip co…
Originally published in 1997 and now available as an ebook. The first book on ‘the most profitable company on earth’, by the bestselling author of Virgin King.This edition does not include illustrations.Intel has been dubbed the most powerful chip co…
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat thi…
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat thi…
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, «connecting the dots» has become the watchword for using information and intelligence to protec…
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
New automated, application-independent methodology for designing and deploying sensor networks Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications witho…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
Introducing mobile multimedia – the technologies, digital rights management and everything else you need to know for delivering cost efficient multimedia to mobile terminals Efficiency and cost effectiveness within multimedia delivery is fast becomin…
During the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise application…
During the IFAC/IFIP I-ESA international conference, supported by the INTEROP NoE and the ATHENA IP, three workshops and a doctoral symposium were organized in order to strengthen some key topics related to interoperability for enterprise application…
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and …
This is the first book in the two-volume set offering comprehensive coverage of the field of computer organization and architecture. This book provides complete coverage of the subjects pertaining to introductory courses in computer organization and …