bannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

Advanced Internet Protocols, Services, and Applications
4
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on ad…
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on ad…
Foundations of Coding. Compression, Encryption, Error Correction
5
Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of conte…
Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of conte…
Electronic Health Record. Standards, Coding Systems, Frameworks, and Infrastructures
4
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT for bet…
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT for bet…
Organizational Design for Knowledge Management
3
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the produ…
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the produ…
Prospective Ergonomics
3
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences…
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences…
Content Delivery Networks. Fundamentals, Design, and Evolution
5
The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and to ens…
The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and to ens…
Designing Interactive Hypermedia Systems
5
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social and te…
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social and te…
The Image-Interface. Graphical Supports for Visual Information
3
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rend…
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rend…
Cyber-Assurance for the Internet of Things
4
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Th…
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Th…
Belief and Misbelief Asymmetry on the Internet
3
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring with indignant fascination the idea of a machination against truth set up to serve a society of domi…
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring with indignant fascination the idea of a machination against truth set up to serve a society of domi…
Secure Connected Objects
3
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Thin…
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Thin…
Energy Security. An Interdisciplinary Approach
3
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A co…
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A co…
Collective Intelligence and Digital Archives. Towards Knowledge Ecosystems
3
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present an…
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present an…
Vehicular Ad Hoc Network Security and Privacy
5
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores i…
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores i…
Information Security. Principles and Practice
5
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative…
Interactions on Digital Tablets in the Context of 3D Geometry Learning. Contributions and Assessments
4
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of …
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of …
Transformation of Collective Intelligences. Perspective of Transhumanism
5
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also co…
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also co…
Cyber-Risk Informatics. Engineering Evaluation with Data Science
4
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative ris…
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative ris…
Security Management of Next Generation Telecommunications Networks and Services
3
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive inform…
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive inform…
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
4
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the preca…
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the preca…

Популярные авторы