bannerbanner
logo

Зарубежная компьютерная литература

Самое популярноеНовое
Mastering Linux System Administration
Mastering Linux System Administration
[b]Achieve Linux system administration mastery with time-tested and proven techniques [/b] In [i]Mastering Linux System Administration[/i], Linux expe…
Подробнее
Information Processing by Biochemical Systems. Neural Network-Type Configurations
Information Processing by Biochemical Systems. Neural Network-Type Configurations
A Research-Driven Resource on Building Biochemical Systems to Perform Information Processing Functions Information Processing by Biochemical Systems d…
Подробнее
Agile Documentation
Agile Documentation
Software documentation forms the basis for all communication relating to a software project. To be truly effective and usable, it should be based on w…
Подробнее
Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World
Autonomy: The Quest to Build the Driverless Car - And How It Will Reshape Our World
’A fascinating hybrid. Part freewheeling history of the rise of the modern autonomous vehicle, part intimate memoir from an insider who was on the fro…
Подробнее
Criptomonedas
Criptomonedas
Muchas oportunidades de inversión han aparecido y desaparecido. Ahora es el momento de las criptomonedas, así que no pierda el tren. Las criptomonedas…
Подробнее
Secrets and Lies
Secrets and Lies
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Br…
Подробнее
Drupal For Dummies
Drupal For Dummies
Learn to set up, manage, and administer a Drupal web site Drupal offers unparalleled flexibility for content-managed web sites, and Drupal 7 is the ea…
Подробнее
Professional C++
Professional C++
Get up to date quickly on the new changes coming with C++17 Professional C++ is the advanced manual for C++ programming. Designed to help experienced …
Подробнее
Internet Security
Internet Security
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the boo…
Подробнее
Cyber Smart. Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Cyber Smart. Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerf…
Подробнее
Podcasting For Dummies
Podcasting For Dummies
Produce a podcast like the pros More people than ever are turning to podcasts for on-demand, mobile entertainment and information. Podcasting For Dumm…
Подробнее
Insider Threats
Insider Threats
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consi…
Подробнее
Domain Architectures
Domain Architectures
Domain Architectures is a comprehensive catalog of the domain architectures essential to software developers using object-oriented technology and UML …
Подробнее
Information Security
Information Security
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to …
Подробнее
Data Control
Data Control
Businesses are becoming increasingly aware of the importance of data and information. As such, they are eager to develop ways to manage them, to enric…
Подробнее
Requirements Modelling and Specification for Service Oriented Architecture
Requirements Modelling and Specification for Service Oriented Architecture
Many software developers often confuse requirements engineering with software specification and, as a result, build unusable systems, despite meeting …
Подробнее
Mathematics of Bioinformatics. Theory, Methods and Applications
Mathematics of Bioinformatics. Theory, Methods and Applications
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived fr…
Подробнее
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th atta…
Подробнее
Security Engineering
Security Engineering
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and…
Подробнее
MCSA Windows Server 2016 Practice Tests. Exam 70-740, Exam 70-741, Exam 70-742, and Exam 70-743
MCSA Windows Server 2016 Practice Tests. Exam 70-740, Exam 70-741, Exam 70-742, and Exam 70-743
Get prepared for the high-stakes MCSA Windows Server 2016 certification exam Windows Server 2016 is the latest version of Microsoft's Windows server o…
Подробнее
Adobe Photoshop CS6 Top 100 Simplified Tips and Tricks
Adobe Photoshop CS6 Top 100 Simplified Tips and Tricks
Take your Photoshop skills to the next level Users who already know Photoshop basics will love this colorful, step-by-step guide to new tricks and tec…
Подробнее
Learning from Data
Learning from Data
An interdisciplinary framework for learning methodologies—covering statistics, neural networks, and fuzzy logic, this book provides a unified treatmen…
Подробнее
Hard, Soft and Wet
Hard, Soft and Wet
First published in 1997 and now available as an ebook.Who are the digital generation? They are the millions of youngsters who live with, and love, the…
Подробнее
Foundations of Coding
Foundations of Coding
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a n…
Подробнее
Excel 2016 For Dummies
Excel 2016 For Dummies
Let your Excel skills sore to new heights with this bestselling guide Updated to reflect the latest changes to the Microsoft Office suite, this new ed…
Подробнее
Algorithms to Live By: The Computer Science of Human Decisions
Algorithms to Live By: The Computer Science of Human Decisions
A fascinating exploration of how computer algorithms can be applied to our everyday lives.In this dazzlingly interdisciplinary work, acclaimed author …
Подробнее
Modeling and Simulation
Modeling and Simulation
Simulation is the art of using tools – physical or conceptual models, or computer hardware and software, to attempt to create the illusion of reality.…
Подробнее
Bioinformatics Algorithms
Bioinformatics Algorithms
Presents algorithmic techniques for solving problems in bioinformatics, including applications that shed new light on molecular biology This book intr…
Подробнее
Data Mining
Data Mining
First title to ever present soft computing approaches and their application in data mining, along with the traditional hard-computing approaches Addre…
Подробнее
The Truth Machine: The Blockchain and the Future of Everything
The Truth Machine: The Blockchain and the Future of Everything
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet’s next big thing: the blockchain.Many of the …
Подробнее
Distributed Database Management Systems. A Practical Approach
Distributed Database Management Systems. A Practical Approach
This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory a…
Подробнее
Windows 11 Simplified
Windows 11 Simplified
[b]Learn Windows 11 quickly, easily, and with expert help from a tech education master[/b] [i]Windows 11 Simplified[/i] is your from-scratch beginner’…
Подробнее
The New IQ: Use Your Working Memory to Think Stronger, Smarter, Faster
The New IQ: Use Your Working Memory to Think Stronger, Smarter, Faster
Working memory – a bigger asset than IQWorking memory – your ability to work with information – influences nearly everything you do.What if you could …
Подробнее
Smarter Than You Think: How Technology is Changing Our Minds for the Better
Smarter Than You Think: How Technology is Changing Our Minds for the Better
A brilliant examination into how the internet is profoundly changing the way we think.In this groundbreaking book, Wired writer Clive Thompson argues …
Подробнее
Soft Computing Evaluation Logic. The LSP Decision Method and Its Applications
Soft Computing Evaluation Logic. The LSP Decision Method and Its Applications
A novel approach to decision engineering, with a verified framework for modeling human reasoning Soft Computing Evaluation Logic provides an in-depth …
Подробнее
Distributed Storage Networks
Distributed Storage Networks
The worldwide market for SAN and NAS storage is anticipated to grow from US $2 billion in 1999 to over $25 billion by 2004. As business-to-business an…
Подробнее
Computer Assisted Exercises and Training. A Reference Guide
Computer Assisted Exercises and Training. A Reference Guide
A comprehensive guide to computer assisted exercises Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of th…
Подробнее
Applied Cryptanalysis
Applied Cryptanalysis
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every ef…
Подробнее
Elements of Computational Systems Biology
Elements of Computational Systems Biology
Groundbreaking, long-ranging research in this emergent field that enables solutions to complex biological problems Computational systems biology is an…
Подробнее
Market-Oriented Grid and Utility Computing
Market-Oriented Grid and Utility Computing
The first single-source reference covering the state of the art in grid and utility computing economy research This book presents the first integrated…
Подробнее
Pipelined Processor Farms
Pipelined Processor Farms
This book outlines a methodology for the use of parallel processing in real time systems. It provides an introduction to parallel processing in genera…
Подробнее
Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies
Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies
A unique, hands-on guide to interactive modeling and simulation of engineering systems This book describes advanced, cutting-edge techniques for dynam…
Подробнее
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new b…
Подробнее
Непрерывное развитие API. Правильные решения в изменчивом технологическом ландшафте (pdf+epub)
Непрерывное развитие API. Правильные решения в изменчивом технологическом ландшафте (pdf+epub)
Для реализации API необходимо провести большую работу. Чрезмерное планирование может стать пустой тратой сил, а его недостаток приводит к катастрофиче…
Подробнее
Hit Refresh: A Memoir by Microsoft’s CEO
Hit Refresh: A Memoir by Microsoft’s CEO
Microsoft’s CEO tells the inside story of the company’s continuing transformation, while tracing his own journey from a childhood in India to leading …
Подробнее
Вход В личный кабинетРегистрация