• 1
  • ...
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • 27

  • зарубежная компьютерная литература

    Martin Sykes. Stories that Move Mountains

    Stories that Move Mountains

    Martin Sykes

    Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success, until now. Developed over a twelve year period as a presentation method to help Enterprise...
    Christian Vogt. Advanced Internet Protocols, Services, and Applications

    Advanced Internet Protocols, Services, and Applications

    Christian Vogt

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based...
    Jennifer L. Bayuk. Cyber Security Policy Guidebook

    Cyber Security Policy Guidebook

    Jennifer L. Bayuk

    Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great...
    Zach  Lanier. Android Hacker's Handbook

    Android Hacker's Handbook

    Zach Lanier

    The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who...
    Michael Gregg. The Network Security Test Lab

    The Network Security Test Lab

    Michael Gregg

    The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack...
    Joseph Henrotin. The Art of War in the Network Age

    The Art of War in the Network Age

    Joseph Henrotin

    Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the...
    David Bertolo. Interactions on Digital Tablets in the Context of 3D Geometry Learning

    Interactions on Digital Tablets in the Context of 3D Geometry Learning

    David Bertolo

    Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main...
    Matthew Monte. Network Attacks and Exploitation

    Network Attacks and Exploitation

    Matthew Monte

    Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and...
    Ying Tan. Artificial Immune System

    Artificial Immune System

    Ying Tan

    This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current...
    Adam Shostack. Threat Modeling

    Threat Modeling

    Adam Shostack

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a...
    Mehmet Sahinoglu. Cyber-Risk Informatics

    Cyber-Risk Informatics

    Mehmet Sahinoglu

    This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based...
    Dom Robinson. Content Delivery Networks

    Content Delivery Networks

    Dom Robinson

    The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and...
    Everardo Reyes-Garcia. The Image-Interface

    The Image-Interface

    Everardo Reyes-Garcia

    Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is...
    Chris Binnie. Linux Server Security

    Linux Server Security

    Chris Binnie

    Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced...
    Faithe Wempen. Computing Fundamentals

    Computing Fundamentals

    Faithe Wempen

    Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft...
    Tarek Samara. ERP and Information Systems

    ERP and Information Systems

    Tarek Samara

    This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems...
    Thomas J. Mowbray. Cybersecurity

    Cybersecurity

    Thomas J. Mowbray

    A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other...
    Sanjay Kumar Chaturvedi. Network Reliability

    Network Reliability

    Sanjay Kumar Chaturvedi

    In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The present text is aimed at providing modelling and analysis techniques for the evaluation of...
    Jean-Max Noyer. Transformation of Collective Intelligences

    Transformation of Collective Intelligences

    Jean-Max Noyer

    There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are...
    Stuart Jacobs. Security Management of Next Generation Telecommunications Networks and Services

    Security Management of Next Generation Telecommunications Networks and Services

    Stuart Jacobs

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive...
    Kar?n Fort. Collaborative Annotation for Reliable Natural Language Processing

    Collaborative Annotation for Reliable Natural Language Processing

    Kar?n Fort

    This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success...
    Nicolas Turenne. Knowledge Needs and Information Extraction

    Knowledge Needs and Information Extraction

    Nicolas Turenne

    This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which...
    Группа авторов. Competitive Intelligence and Decision Problems

    Competitive Intelligence and Decision Problems

    Группа авторов

    The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when interpreting results,...
    Группа авторов. Bioinformatics in Aquaculture

    Bioinformatics in Aquaculture

    Группа авторов

    Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed and, whenever possible, associated with experimental results from various sources, to draw...
    Garth O. Bruen. WHOIS Running the Internet

    WHOIS Running the Internet

    Garth O. Bruen

    Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its...
    Fernando Lagrana. E-mail and Behavioral Changes

    E-mail and Behavioral Changes

    Fernando Lagrana

    This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented....
    Bill Woodward. Fiber Optics Installer (FOI) Certification Exam Guide

    Fiber Optics Installer (FOI) Certification Exam Guide

    Bill Woodward

    Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundation in fiber optics and thorough preparation for the Fiber Optics Installer (FOI) certification....
    Colin Bookham. Versatile Routing and Services with BGP

    Versatile Routing and Services with BGP

    Colin Bookham

    Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a...
    Ken Chen. Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

    Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

    Ken Chen

    This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the...
    Maryse Salles. Decision-Making and the Information System

    Decision-Making and the Information System

    Maryse Salles

    The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions...
    Группа авторов. Cyber-Assurance for the Internet of Things

    Cyber-Assurance for the Internet of Things

    Группа авторов

    Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security...
    Adam Lindsay Gordon. The Official (ISC)2 Guide to the CCSP CBK

    The Official (ISC)2 Guide to the CCSP CBK

    Adam Lindsay Gordon

    Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second...
    Jeff Kosseff. Cybersecurity Law

    Cybersecurity Law

    Jeff Kosseff

    A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws...
    Daniel Ventre. Information Warfare

    Information Warfare

    Daniel Ventre

    Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and...
    Elsa N?gre. Information and Recommender Systems

    Information and Recommender Systems

    Elsa N?gre

    Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or representation. In a context of steady increase in the mass of information it is difficult to know...
    Fernando Iafrate. From Big Data to Smart Data

    From Big Data to Smart Data

    Fernando Iafrate

    A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision making can be reached via information (related to the data), knowledge (related to people and...
    Jerome Beranger. Medical Information Systems Ethics

    Medical Information Systems Ethics

    Jerome Beranger

    The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of issues surrounding health IT. The proper use of these communication tools, such as telemedicine,...
    Eric Bauer. Lean Computing for the Cloud

    Lean Computing for the Cloud

    Eric Bauer

    Applies lean manufacturing principles across the cloud service delivery chain to enable application and infrastructure service providers to sustainably achieve the shortest lead time, best quality, and value Applies lean thinking across the...
    G?rald Bronner. Belief and Misbelief Asymmetry on the Internet

    Belief and Misbelief Asymmetry on the Internet

    G?rald Bronner

    This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring with indignant fascination the idea of a machination against truth set up to serve a society of...
    Mun?o Kitajima. Memory and Action Selection in Human-Machine Interaction

    Memory and Action Selection in Human-Machine Interaction

    Mun?o Kitajima

    The first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how...
    Mona Ben Chouikha. Organizational Design for Knowledge Management

    Organizational Design for Knowledge Management

    Mona Ben Chouikha

    Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the...
    Andr? Vitalis. The Uncertain Digital Revolution

    The Uncertain Digital Revolution

    Andr? Vitalis

    Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has...
    Andr? Liem. Prospective Ergonomics

    Prospective Ergonomics

    Andr? Liem

    This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science....
    Fr?d?ric Magoules. Data Mining and Machine Learning in Building Energy Analysis

    Data Mining and Machine Learning in Building Energy Analysis

    Fr?d?ric Magoules

    Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial Intelligence for Building Energy Analysis reviews recently developed models for solving these issues, including detailed and simplified...
    Qing  Li. Security Intelligence

    Security Intelligence

    Qing Li

    Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...
    Saoussen Krichen. Graph-related Optimization and Decision Support Systems

    Graph-related Optimization and Decision Support Systems

    Saoussen Krichen

    Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two...
    Guenter Schaefer. Security in Fixed and Wireless Networks

    Security in Fixed and Wireless Networks

    Guenter Schaefer

    Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate...
    Kai  Hwang. Big-Data Analytics for Cloud, IoT and Cognitive Computing

    Big-Data Analytics for Cloud, IoT and Cognitive Computing

    Kai Hwang

    The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that...
    Elias  Bachaalany. The Antivirus Hacker's Handbook

    The Antivirus Hacker's Handbook

    Elias Bachaalany

    Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be...
    Karim Said. Asymmetric Alliances and Information Systems

    Asymmetric Alliances and Information Systems

    Karim Said

    This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value...
  • 1
  • ...
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • 27
  • Оставайтесь на связи

    Будьте в курсе новостей о выходящих книгах, подпишитесь на нашу еженедельную рассылку:
    © 2011-2024. Your Lib. All Rights Reserved.