bannerbanner
ЗарубежныеРусскиеВсе

зарубежная компьютерная литература

Energy Security. An Interdisciplinary Approach
3
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A co…
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A co…
Collective Intelligence and Digital Archives. Towards Knowledge Ecosystems
3
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present an…
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present an…
Vehicular Ad Hoc Network Security and Privacy
5
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores i…
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores i…
Information Security. Principles and Practice
5
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative…
Interactions on Digital Tablets in the Context of 3D Geometry Learning. Contributions and Assessments
4
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of …
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of …
Transformation of Collective Intelligences. Perspective of Transhumanism
5
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also co…
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also co…
Cyber-Risk Informatics. Engineering Evaluation with Data Science
4
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative ris…
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative ris…
Security Management of Next Generation Telecommunications Networks and Services
3
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive inform…
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive inform…
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
4
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the preca…
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the preca…
Introduction to Network Security. Theory and Practice
4
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully u…
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully u…
Information Systems for Knowledge Management
5
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their experience and accumulated knowledge about the firm activities. However, considering the large amount o…
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their experience and accumulated knowledge about the firm activities. However, considering the large amount o…
Reversible Computing. Fundamentals, Quantum Computing, and Applications
3
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It …
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It …
Brain-Computer Interfaces 2. Technology and Applications
3
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibilities for investigation and application. This book provides keys for understanding and designing thes…
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibilities for investigation and application. This book provides keys for understanding and designing thes…
Information Evaluation
3
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of con…
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of con…
Biomolecular Networks. Methods and Applications in Systems Biology
4
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular networks i…
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular networks i…
System Design for Telecommunication Gateways
3
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that ch…
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that ch…
Medical Information Systems Ethics
3
The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of issues surrounding health IT. The proper use of these communication tools, such as telemedicine, e-he…
The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of issues surrounding health IT. The proper use of these communication tools, such as telemedicine, e-he…
Competitive Intelligence and Decision Problems
3
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when interpreting results, either…
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when interpreting results, either…
Collective Intelligence Development in Business
5
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relational processes. The purpose is to help the reader become a better Collective Intelligence Leader, who w…
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relational processes. The purpose is to help the reader become a better Collective Intelligence Leader, who w…
Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms. General Report on Tunny with Emphasis on Statistical Methods (1945)
3
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit i…
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit i…

Популярные авторы