Поджанры:
Зарубежная компьютерная литература
Самое популярноеНовое
Fiber Optics Installer (FOI) Certification Exam Guide
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundatio…
ПодробнееLinux Server Security. Hack and Defend
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for exper…
ПодробнееCloud Computing. Principles and Paradigms
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identi…
ПодробнееSecurity Management of Next Generation Telecommunications Networks and Services
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolv…
ПодробнееBelief and Misbelief Asymmetry on the Internet
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring …
ПодробнееCybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attack…
ПодробнееThe Network Security Test Lab. A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securi…
ПодробнееBreaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms. General Report on Tunny with Emphasis on Statistical Methods (1945)
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a va…
ПодробнееInformation Systems for Knowledge Management
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their exp…
ПодробнееCyber-Assurance for the Internet of Things
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlightin…
ПодробнееThreat Modeling. Designing for Security
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack…
ПодробнееNetwork Attacks and Exploitation. A Framework
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadma…
ПодробнееMedical Information Systems Ethics
The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of i…
ПодробнееIntroduction to Network Security. Theory and Practice
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts wi…
ПодробнееTransformation of Collective Intelligences. Perspective of Transhumanism
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) aff…
ПодробнееComputing Fundamentals. Digital Literacy Edition
The Basic Computing Skills You Need to Enhance Your Academic Education Computing Fundamentals provides students with the basic computing skills needed…
ПодробнееOpenStack Cloud Application Development
Leverage the power of OpenStack to develop scalable applications with no vendor lock-in OpenStack Cloud Application Development is a fast-paced, profe…
ПодробнееSystem Design for Telecommunication Gateways
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware …
ПодробнееPerformance Evaluation by Simulation and Analysis with Applications to Computer Networks
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An im…
ПодробнееInteractions on Digital Tablets in the Context of 3D Geometry Learning. Contributions and Assessments
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry lear…
ПодробнееFrom Big Data to Smart Data
A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision…
ПодробнееStories that Move Mountains. Storytelling and Visual Design for Persuasive Presentations
Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success…
ПодробнееCollective Intelligence Development in Business
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relationa…
ПодробнееCyber-Risk Informatics. Engineering Evaluation with Data Science
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and thre…
ПодробнееEnergy Security. An Interdisciplinary Approach
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing internatio…
ПодробнееInformation and Recommender Systems
Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or rep…
ПодробнееQuickBooks Online For Dummies
Organise business finances with the latest cloud-based accounting innovation QuickBooks Online For Dummies, Australian Edition is your key guide to ge…
ПодробнееCompetitive Intelligence and Decision Problems
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards t…
ПодробнееInformation Security. Principles and Practice
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume…
ПодробнееDesigning Interactive Hypermedia Systems
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The des…
ПодробнееAndroid Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share …
ПодробнееBioinformatics in Aquaculture. Principles and Methods
Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed…
ПодробнееBiomolecular Networks. Methods and Applications in Systems Biology
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental…
ПодробнееVehicular Ad Hoc Network Security and Privacy
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperati…
ПодробнееSecurity in Fixed and Wireless Networks
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secu…
ПодробнееPractical Reverse Engineering. x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding …
ПодробнееNetwork Reliability. Measures and Evaluation
In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The presen…
ПодробнееInformation Evaluation
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, …
ПодробнееCollective Intelligence and Digital Archives. Towards Knowledge Ecosystems
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (librarie…
ПодробнееProspective Ergonomics
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplin…
ПодробнееThe Antivirus Hacker's Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering…
ПодробнееComputer Science and Ambient Intelligence
This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holist…
ПодробнееBrain-Computer Interfaces 2. Technology and Applications
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibili…
ПодробнееSecure Connected Objects
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including con…
ПодробнееOrganizational Design for Knowledge Management
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformati…
Подробнее











































