Поджанры:
Зарубежная компьютерная литература
Самое популярноеНовое
- 0
- 0
- 0
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring …
Подробнее- 0
- 0
- 0
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering…
Подробнее- 0
- 0
- 0
This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holist…
Подробнее- 0
- 0
- 0
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibili…
Подробнее- 0
- 0
- 0
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including con…
Подробнее- 0
- 0
- 0
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundatio…
Подробнее- 0
- 0
- 0
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for exper…
Подробнее- 0
- 0
- 0
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identi…
Подробнее- 0
- 0
- 0
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolv…
Подробнее- 0
- 0
- 0
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring …
Подробнее- 0
- 0
- 0
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attack…
Подробнее- 0
- 0
- 0
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securi…
Подробнее- 0
- 0
- 0
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a va…
Подробнее- 0
- 0
- 0
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their exp…
Подробнее- 0
- 0
- 0
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlightin…
Подробнее- 0
- 0
- 0
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack…
Подробнее- 0
- 0
- 0
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadma…
Подробнее- 0
- 0
- 0
The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of i…
Подробнее- 0
- 0
- 0
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts wi…
Подробнее- 0
- 0
- 0
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) aff…
Подробнее- 0
- 0
- 0
The Basic Computing Skills You Need to Enhance Your Academic Education Computing Fundamentals provides students with the basic computing skills needed…
Подробнее- 0
- 0
- 0
Leverage the power of OpenStack to develop scalable applications with no vendor lock-in OpenStack Cloud Application Development is a fast-paced, profe…
Подробнее- 0
- 0
- 0
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware …
Подробнее- 0
- 0
- 0
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An im…
Подробнее- 0
- 0
- 0
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry lear…
Подробнее- 0
- 0
- 0
A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision…
Подробнее- 0
- 0
- 0
Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success…
Подробнее- 0
- 0
- 0
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relationa…
Подробнее- 0
- 0
- 0
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and thre…
Подробнее- 0
- 0
- 0
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing internatio…
Подробнее- 0
- 0
- 0
Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or rep…
Подробнее- 0
- 0
- 0
Organise business finances with the latest cloud-based accounting innovation QuickBooks Online For Dummies, Australian Edition is your key guide to ge…
Подробнее- 0
- 0
- 0
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards t…
Подробнее- 0
- 0
- 0
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume…
Подробнее- 0
- 0
- 0
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The des…
Подробнее- 0
- 0
- 0
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share …
Подробнее- 0
- 0
- 0
Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed…
Подробнее- 0
- 0
- 0
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental…
Подробнее- 0
- 0
- 0
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperati…
Подробнее- 0
- 0
- 0
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secu…
Подробнее- 0
- 0
- 0
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding …
Подробнее- 0
- 0
- 0
In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The presen…
Подробнее- 0
- 0
- 0
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, …
Подробнее- 0
- 0
- 0
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (librarie…
Подробнее- 0
- 0
- 0
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplin…
Подробнее