bannerbanner
logo

Зарубежная компьютерная литература

CSS3 Foundations
CSS3 Foundations
Master innovative and eye-catching website design with the exciting new Treehouse Series of books Turn plain words and images into stunning websites w…
Подробнее
Algorithms for Image Processing and Computer Vision
Algorithms for Image Processing and Computer Vision
A cookbook of algorithms for common image processing applications Thanks to advances in computer hardware and software, algorithms have been developed…
Подробнее
Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, ma…
Подробнее
Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation
Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation
A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web platforms have specific requir…
Подробнее
Java Enterprise Design Patterns. Patterns in Java
Java Enterprise Design Patterns. Patterns in Java
A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores th…
Подробнее
The Art of Videogames
The Art of Videogames
The Art of Videogames explores how philosophy of the arts theories developed to address traditional art works can also be applied to videogames. Prese…
Подробнее
Practical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET
The most up-to-date Visual Basic.NET programming textbook—covering both fundamentals and advanced-level programming techniques—complete with examples …
Подробнее
Practical Database Programming With Visual C#.NET
Practical Database Programming With Visual C#.NET
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the consid…
Подробнее
Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed
Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastruct…
Подробнее
Network Services Investment Guide. Maximizing ROI in Uncertain Times
Network Services Investment Guide. Maximizing ROI in Uncertain Times
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage th…
Подробнее
Software Architecture 2
Software Architecture 2
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is r…
Подробнее
Semantic Web and Model-Driven Engineering
Semantic Web and Model-Driven Engineering
The next enterprise computing era will rely on the synergy between both technologies: semantic web and model-driven software development (MDSD). The s…
Подробнее
Design for Reliability. Information and Computer-Based Systems
Design for Reliability. Information and Computer-Based Systems
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't underst…
Подробнее
Oracle Database Performance and Scalability. A Quantitative Approach
Oracle Database Performance and Scalability. A Quantitative Approach
The innovative performance and scalability features with each newer edition of the Oracle database system can present challenges for users. This book …
Подробнее
Malicious Cryptography. Exposing Cryptovirology
Malicious Cryptography. Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It…
Подробнее
Software Architecture 1
Software Architecture 1
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is r…
Подробнее
Self-Adaptive Systems for Machine Intelligence
Self-Adaptive Systems for Machine Intelligence
This book will advance the understanding and application of self-adaptive intelligent systems; therefore it will potentially benefit the long-term goa…
Подробнее
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for…
Подробнее
Custom CGI Scripting with Perl
Custom CGI Scripting with Perl
The only one-stop resource for Web developers and programmers This book is an indispensable resource for Web developers and programmers who program CG…
Подробнее
UNIX Filesystems. Evolution, Design, and Implementation
UNIX Filesystems. Evolution, Design, and Implementation
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical da…
Подробнее
Cybercrime and Cyber Warfare
Cybercrime and Cyber Warfare
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fund…
Подробнее
Smashing HTML5
Smashing HTML5
Welcome to HTML5 – the future of the Web HTML5 is packed with great new features, including new content-specific elements, audio and video playback, c…
Подробнее
Functional Programming in C#. Classic Programming Techniques for Modern Projects
Functional Programming in C#. Classic Programming Techniques for Modern Projects
Take advantage of the growing trend in functional programming. C# is the number-one language used by .NET developers and one of the most popular progr…
Подробнее
The Mac OS X Command Line. Unix Under the Hood
The Mac OS X Command Line. Unix Under the Hood
The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI…
Подробнее
Linux Security. Craig Hunt Linux Library
Linux Security. Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Lin…
Подробнее
The Death of the Internet
The Death of the Internet
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or …
Подробнее
Algorithms and Parallel Computing
Algorithms and Parallel Computing
There is a software gap between the hardware potential and the performance that can be attained using today's software parallel program development to…
Подробнее
Energy Security. An Interdisciplinary Approach
Energy Security. An Interdisciplinary Approach
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing internatio…
Подробнее
Reversing. Secrets of Reverse Engineering
Reversing. Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the va…
Подробнее
Service Providers. ASPs, ISPs, MSPs, and WSPs
Service Providers. ASPs, ISPs, MSPs, and WSPs
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespi…
Подробнее
A Practical Introduction to Computer Vision with OpenCV
A Practical Introduction to Computer Vision with OpenCV
Explains the theory behind basic computer vision and provides a bridge from the theory to practical implementation using the industry standard OpenCV …
Подробнее
Software Metrics and Software Metrology
Software Metrics and Software Metrology
Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at…
Подробнее
Data Mining for Genomics and Proteomics. Analysis of Gene and Protein Expression Data
Data Mining for Genomics and Proteomics. Analysis of Gene and Protein Expression Data
Data Mining for Genomics and Proteomics uses pragmatic examples and a complete case study to demonstrate step-by-step how biomedical studies can be us…
Подробнее
AutoCAD. Secrets Every User Should Know
AutoCAD. Secrets Every User Should Know
"I've been using AutoCAD for 22 years and have written a hundred books on the subject. I reviewed many CAD books back in the days when book reviews we…
Подробнее
Building B2B Applications with XML. A Resource Guide
Building B2B Applications with XML. A Resource Guide
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2B marketplace is rapidly explo…
Подробнее
Practical Database Programming with Java
Practical Database Programming with Java
Covers fundamental and advanced Java database programming techniques for beginning and experienced readers This book covers the practical consideratio…
Подробнее
Enterprise Data Governance. Reference and Master Data Management Semantic Modeling
Enterprise Data Governance. Reference and Master Data Management Semantic Modeling
In an increasingly digital economy, mastering the quality of data is an increasingly vital yet still, in most organizations, a considerable task. The …
Подробнее
Assembly Language Programming. ARM Cortex-M3
Assembly Language Programming. ARM Cortex-M3
ARM designs the cores of microcontrollers which equip most “embedded systems” based on 32-bit processors. Cortex M3 is one of these designs, recently …
Подробнее
Beginning Algorithms
Beginning Algorithms
Beginning Algorithms A good understanding of algorithms, and the knowledge of when to apply them, is crucial to producing software that not only works…
Подробнее
Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit
Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only…
Подробнее
Introduction to IP Address Management
Introduction to IP Address Management
A step-by-step guide to managing critical technologies of today's converged services IP networks Effective IP Address Management (IPAM) has become cru…
Подробнее
Information Security. Principles and Practice
Information Security. Principles and Practice
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume…
Подробнее
Public Key Cryptography. Applications and Attacks
Public Key Cryptography. Applications and Attacks
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Pub…
Подробнее
Unauthorised Access. Physical Penetration Testing For IT Security Teams
Unauthorised Access. Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping netwo…
Подробнее
Advanced QoS for Multi-Service IP/MPLS Networks
Advanced QoS for Multi-Service IP/MPLS Networks
Advanced QoS for Multi-Service IP/MPLS Networks is the definitive guide to Quality of Service (QoS), with comprehensive information about its features…
Подробнее
Вход В личный кабинетРегистрация