Поджанры:
Зарубежная компьютерная литература
Самое популярноеНовое
- 0
- 0
- 0
The only comprehensive tutorial/reference exclusively devoted to Autodesk's robust architectural visualization software 3ds Max Design is a powerful r…
Подробнее- 0
- 0
- 0
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping netwo…
Подробнее- 0
- 0
- 0
The first and only book to offer detailed explanations of SAP ERP sales and distribution As the only book to provide in-depth configuration of the Sal…
Подробнее- 0
- 0
- 0
Software patterns have revolutionized the way developers think about how software is designed, built, and documented, and this unique book offers an i…
Подробнее- 0
- 0
- 0
This book outlines a methodology for the use of parallel processing in real time systems. It provides an introduction to parallel processing in genera…
Подробнее- 0
- 0
- 0
Muchas oportunidades de inversión han aparecido y desaparecido. Ahora es el momento de las criptomonedas, así que no pierda el tren. Las criptomonedas…
Подробнее- 0
- 0
- 0
CISSP Study Guide – fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study…
Подробнее- 0
- 0
- 0
Ричард «Лорд Бритиш» Гэрриот – один из самых известных пионеров игровой индустрии. Разработанная им серия ролевых игр Ultima совершила настоящую револ…
Подробнее- 0
- 0
- 0
In Professional Visual Studio 2010, developers will find a fast route to IDE programming success. The authors zero in on advanced topics and demonstra…
Подробнее- 0
- 0
- 0
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the sci…
Подробнее- 0
- 0
- 0
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will aft…
Подробнее- 0
- 0
- 0
CISSP Study Guide – fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study…
Подробнее- 0
- 0
- 0
A fully updated new edition of the fun and easy guide to getting up and running on Twitter With more than half a billion registered users, Twitter con…
Подробнее- 0
- 0
- 0
Software Testing presents one of the first comprehensive guides to testing activities, ranging from test planning through test completion for every ph…
Подробнее- 0
- 0
- 0
A must-have study guide for exam 640-911 on Cisco's Unified Data Center The Cisco Certified Network Associate Data Center certification is Cisco's new…
Подробнее- 0
- 0
- 0
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the ev…
Подробнее- 0
- 0
- 0
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resou…
Подробнее- 0
- 0
- 0
A practical approach for anyone looking to enter the IT workforce Before candidates can begin to prepare for any kind of certification, they need a ba…
Подробнее- 0
- 0
- 0
This is the first practical treatment of the design and application of feedback control of computing systems. MATLAB files for the solution of problem…
Подробнее- 0
- 0
- 0
[b]CORPORATE CYBERSECURITY[/b] [b]An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs[/b] A bug bou…
Подробнее- 0
- 0
- 0
Mit diesem Buch können Sie sich ganz leicht in Windows 11 einarbeiten. Wenn Sie die wesentlichen Grundlagen verstehen wollen, ohne sich durch verwirre…
Подробнее- 0
- 0
- 0
Create Android mobile apps, no programming required! Even with limited programming experience, you can easily learn to create apps for the Android pla…
Подробнее- 0
- 0
- 0
Extending the scenario method beyond interface design, this important book shows developers how to design more effective systems by soliciting, analyz…
Подробнее- 0
- 0
- 0
This book focuses on systems analysis, broadly defined to also include problem formulation and interpretation of proposed alternatives in terms of the…
Подробнее- 0
- 0
- 0
You’ve heard all about Second Life. Maybe you’ve already jumped with both feet—and gotten stuck. Or maybe you’re a Second Life veteran who wants to bu…
Подробнее- 0
- 0
- 0
Leverage the full power of Excel formulas Excel 2016 Formulas is fully updated to cover all of the tips, tricks, and techniques you need to maximize t…
Подробнее- 0
- 0
- 0
Have big dreams? Kick start them with JavaScript! If we've learned one thing from the Millennial generation, it's that no one is too young to make his…
Подробнее- 0
- 0
- 0
Financial services institutions like international banks and insurance companies frequently need to adapt to changes in their environments, yet manage…
Подробнее- 0
- 0
- 0
Large Refactorings looks at methods of establish design improvements as an important and independent activity during development of software, and will…
Подробнее- 0
- 0
- 0
Two SharePoint MVPs provide the ultimate introduction to SharePoint 2010 Beginning SharePoint 2010: Building Team Solutions with SharePoint provides i…
Подробнее- 0
- 0
- 0
Mochten Sie mit einem Roboter Handchen halten? Wie fuhlt sich das wohl an? Sind Bewusstsein und Emotionen konstruierbar – oder bleiben sie ein allein …
Подробнее- 0
- 0
- 0
Go from beginner to builder quickly with this hands-on JavaScript guide Coding with JavaScript For Dummies provides easy, hands-on instruction for any…
Подробнее- 0
- 0
- 0
An unparalleled opportunity to learn about an exciting new technology that is revolutionizing network and Internet content delivery Network Query Lang…
Подробнее- 0
- 0
- 0
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query…
Подробнее- 0
- 0
- 0
This book offers comprehensive coverage of all the mathematical tools needed by engineers in the field of processing and transport of all forms of inf…
Подробнее- 0
- 0
- 0
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interw…
Подробнее- 0
- 0
- 0
[b]The only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated 2021 SSCP Ex…
Подробнее- 0
- 0
- 0
The central thesis of The Web's Awake is that the phenomenal growth and complexity of the web is beginning to outstrip our capability to control it di…
Подробнее- 0
- 0
- 0
As Microsoft’s bestselling database manager, SQL Server is highly flexible and customizable, and has excellent support—the 2008 version offers several…
Подробнее- 0
- 0
- 0
Get the most out of your iPhone X Apple's iPhone X represents such a radical departure from all previous models of the globally known iPhone that it n…
Подробнее- 0
- 0
- 0
"This is the best book on patterns since the Gang of Four's Design Patterns. The book manages to be a resource for three of the most important trends …
Подробнее- 0
- 0
- 0
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, wh…
Подробнее- 0
- 0
- 0
Distributed Object Computing teaches readers the fundamentals of CORBA, the leading architecture for design of software used in parallel and distribut…
Подробнее- 0
- 0
- 0
Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication netwo…
Подробнее- 0
- 0
- 0
Evolution of software has long been recognized as one of the most problematic and challenging areas in the field of software engineering, as evidenced…
Подробнее