bannerbanner
logo

Зарубежная компьютерная литература

Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS
Versatile Routing and Services with BGP. Understanding and Implementing BGP in SR-OS
0
Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring …
Подробнее
The Antivirus Hacker's Handbook
The Antivirus Hacker's Handbook
0
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering…
Подробнее
Computer Science and Ambient Intelligence
Computer Science and Ambient Intelligence
0
This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holist…
Подробнее
Brain-Computer Interfaces 2. Technology and Applications
Brain-Computer Interfaces 2. Technology and Applications
0
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibili…
Подробнее
Secure Connected Objects
Secure Connected Objects
0
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including con…
Подробнее
Fiber Optics Installer (FOI) Certification Exam Guide
Fiber Optics Installer (FOI) Certification Exam Guide
0
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundatio…
Подробнее
Linux Server Security. Hack and Defend
Linux Server Security. Hack and Defend
0
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for exper…
Подробнее
Cloud Computing. Principles and Paradigms
Cloud Computing. Principles and Paradigms
0
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identi…
Подробнее
Security Management of Next Generation Telecommunications Networks and Services
Security Management of Next Generation Telecommunications Networks and Services
0
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolv…
Подробнее
Belief and Misbelief Asymmetry on the Internet
Belief and Misbelief Asymmetry on the Internet
0
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring …
Подробнее
Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions
0
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attack…
Подробнее
The Network Security Test Lab. A Step-by-Step Guide
The Network Security Test Lab. A Step-by-Step Guide
0
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securi…
Подробнее
Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms. General Report on Tunny with Emphasis on Statistical Methods (1945)
Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms. General Report on Tunny with Emphasis on Statistical Methods (1945)
0
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a va…
Подробнее
Information Systems for Knowledge Management
Information Systems for Knowledge Management
0
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their exp…
Подробнее
Cyber-Assurance for the Internet of Things
Cyber-Assurance for the Internet of Things
0
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlightin…
Подробнее
Threat Modeling. Designing for Security
Threat Modeling. Designing for Security
0
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack…
Подробнее
Network Attacks and Exploitation. A Framework
Network Attacks and Exploitation. A Framework
0
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadma…
Подробнее
Medical Information Systems Ethics
Medical Information Systems Ethics
0
The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of i…
Подробнее
Introduction to Network Security. Theory and Practice
Introduction to Network Security. Theory and Practice
0
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts wi…
Подробнее
Transformation of Collective Intelligences. Perspective of Transhumanism
Transformation of Collective Intelligences. Perspective of Transhumanism
0
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) aff…
Подробнее
Computing Fundamentals. Digital Literacy Edition
Computing Fundamentals. Digital Literacy Edition
0
The Basic Computing Skills You Need to Enhance Your Academic Education Computing Fundamentals provides students with the basic computing skills needed…
Подробнее
OpenStack Cloud Application Development
OpenStack Cloud Application Development
0
Leverage the power of OpenStack to develop scalable applications with no vendor lock-in OpenStack Cloud Application Development is a fast-paced, profe…
Подробнее
System Design for Telecommunication Gateways
System Design for Telecommunication Gateways
0
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware …
Подробнее
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
0
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An im…
Подробнее
Interactions on Digital Tablets in the Context of 3D Geometry Learning. Contributions and Assessments
Interactions on Digital Tablets in the Context of 3D Geometry Learning. Contributions and Assessments
0
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry lear…
Подробнее
From Big Data to Smart Data
From Big Data to Smart Data
0
A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision…
Подробнее
Stories that Move Mountains. Storytelling and Visual Design for Persuasive Presentations
Stories that Move Mountains. Storytelling and Visual Design for Persuasive Presentations
0
Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success…
Подробнее
Collective Intelligence Development in Business
Collective Intelligence Development in Business
0
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relationa…
Подробнее
Cyber-Risk Informatics. Engineering Evaluation with Data Science
Cyber-Risk Informatics. Engineering Evaluation with Data Science
0
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and thre…
Подробнее
Energy Security. An Interdisciplinary Approach
Energy Security. An Interdisciplinary Approach
0
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing internatio…
Подробнее
Information and Recommender Systems
Information and Recommender Systems
0
Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or rep…
Подробнее
QuickBooks Online For Dummies
QuickBooks Online For Dummies
0
Organise business finances with the latest cloud-based accounting innovation QuickBooks Online For Dummies, Australian Edition is your key guide to ge…
Подробнее
Competitive Intelligence and Decision Problems
Competitive Intelligence and Decision Problems
0
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards t…
Подробнее
Information Security. Principles and Practice
Information Security. Principles and Practice
0
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume…
Подробнее
Designing Interactive Hypermedia Systems
Designing Interactive Hypermedia Systems
0
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The des…
Подробнее
Android Hacker's Handbook
Android Hacker's Handbook
0
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share …
Подробнее
Bioinformatics in Aquaculture. Principles and Methods
Bioinformatics in Aquaculture. Principles and Methods
0
Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed…
Подробнее
Biomolecular Networks. Methods and Applications in Systems Biology
Biomolecular Networks. Methods and Applications in Systems Biology
0
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental…
Подробнее
Vehicular Ad Hoc Network Security and Privacy
Vehicular Ad Hoc Network Security and Privacy
0
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperati…
Подробнее
Security in Fixed and Wireless Networks
Security in Fixed and Wireless Networks
0
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secu…
Подробнее
Practical Reverse Engineering. x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering. x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
0
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding …
Подробнее
Network Reliability. Measures and Evaluation
Network Reliability. Measures and Evaluation
0
In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The presen…
Подробнее
Information Evaluation
Information Evaluation
0
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, …
Подробнее
Collective Intelligence and Digital Archives. Towards Knowledge Ecosystems
Collective Intelligence and Digital Archives. Towards Knowledge Ecosystems
0
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (librarie…
Подробнее
Prospective Ergonomics
Prospective Ergonomics
0
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplin…
Подробнее
Вход В личный кабинетРегистрация