logo

Зарубежная компьютерная литература

0
Fiber Optics Installer (FOI) Certification Exam Guide
0
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundatio…
Подробнее
0
Linux Server Security. Hack and Defend
0
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for exper…
Подробнее
0
Cloud Computing. Principles and Paradigms
0
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identi…
Подробнее
0
Security Management of Next Generation Telecommunications Networks and Services
0
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolv…
Подробнее
0
Belief and Misbelief Asymmetry on the Internet
0
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring …
Подробнее
0
Cybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions
0
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attack…
Подробнее
0
The Network Security Test Lab. A Step-by-Step Guide
0
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securi…
Подробнее
0
Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms. General Report on Tunny with Emphasis on Statistical Methods (1945)
0
This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a va…
Подробнее
0
Information Systems for Knowledge Management
0
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their exp…
Подробнее
0
Cyber-Assurance for the Internet of Things
0
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlightin…
Подробнее
0
Threat Modeling. Designing for Security
0
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack…
Подробнее
0
Network Attacks and Exploitation. A Framework
0
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadma…
Подробнее
0
Medical Information Systems Ethics
0
The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of i…
Подробнее
0
Introduction to Network Security. Theory and Practice
0
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts wi…
Подробнее
0
Transformation of Collective Intelligences. Perspective of Transhumanism
0
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) aff…
Подробнее
0
Computing Fundamentals. Digital Literacy Edition
0
The Basic Computing Skills You Need to Enhance Your Academic Education Computing Fundamentals provides students with the basic computing skills needed…
Подробнее
0
OpenStack Cloud Application Development
0
Leverage the power of OpenStack to develop scalable applications with no vendor lock-in OpenStack Cloud Application Development is a fast-paced, profe…
Подробнее
0
System Design for Telecommunication Gateways
0
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware …
Подробнее
0
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
0
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An im…
Подробнее
0
Interactions on Digital Tablets in the Context of 3D Geometry Learning. Contributions and Assessments
0
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry lear…
Подробнее
0
From Big Data to Smart Data
0
A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision…
Подробнее
0
Stories that Move Mountains. Storytelling and Visual Design for Persuasive Presentations
0
Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success…
Подробнее
0
Collective Intelligence Development in Business
0
This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relationa…
Подробнее
0
Cyber-Risk Informatics. Engineering Evaluation with Data Science
0
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and thre…
Подробнее
0
Energy Security. An Interdisciplinary Approach
0
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing internatio…
Подробнее
0
Information and Recommender Systems
0
Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or rep…
Подробнее
0
QuickBooks Online For Dummies
0
Organise business finances with the latest cloud-based accounting innovation QuickBooks Online For Dummies, Australian Edition is your key guide to ge…
Подробнее
0
Competitive Intelligence and Decision Problems
0
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards t…
Подробнее
0
Information Security. Principles and Practice
0
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume…
Подробнее
0
Designing Interactive Hypermedia Systems
0
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The des…
Подробнее
0
Android Hacker's Handbook
0
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share …
Подробнее
0
Bioinformatics in Aquaculture. Principles and Methods
0
Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed…
Подробнее
0
Biomolecular Networks. Methods and Applications in Systems Biology
0
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental…
Подробнее
0
Vehicular Ad Hoc Network Security and Privacy
0
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperati…
Подробнее
0
Security in Fixed and Wireless Networks
0
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secu…
Подробнее
0
Practical Reverse Engineering. x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
0
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding …
Подробнее
0
Network Reliability. Measures and Evaluation
0
In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The presen…
Подробнее
0
Information Evaluation
0
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, …
Подробнее
0
Collective Intelligence and Digital Archives. Towards Knowledge Ecosystems
0
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (librarie…
Подробнее
0
Prospective Ergonomics
0
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplin…
Подробнее
0
The Antivirus Hacker's Handbook
0
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering…
Подробнее
0
Computer Science and Ambient Intelligence
0
This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holist…
Подробнее
0
Brain-Computer Interfaces 2. Technology and Applications
0
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibili…
Подробнее
0
Secure Connected Objects
0
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including con…
Подробнее
0
Organizational Design for Knowledge Management
0
Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformati…
Подробнее
Вход В личный кабинетРегистрация