зарубежная компьютерная литература

Bradley Jones L.. Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers

Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers

Bradley Jones L.

Web 2.0 may be an elusive concept, but one thing is certain: using the Web as merely a means of retrieving and displaying information is history. Today?s Web is immediate, interactive, innovative. It is user-controlled and community-driven....
Mark  Gaynor. Network Services Investment Guide. Maximizing ROI in Uncertain Times

Network Services Investment Guide. Maximizing ROI in Uncertain Times

Mark Gaynor

This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to...
Paul  Dyson. Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems

Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems

Paul Dyson

A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and systems, and illustrated with a running case study...
Mark  Grand. Java Enterprise Design Patterns. Patterns in Java

Java Enterprise Design Patterns. Patterns in Java

Mark Grand

A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores the subject of design patterns, or patterns that occur in the design phase of a project's life...
Wil  Allsopp. Unauthorised Access. Physical Penetration Testing For IT Security Teams

Unauthorised Access. Physical Penetration Testing For IT Security Teams

Wil Allsopp

The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside?...
Dan  Abbott. AutoCAD. Secrets Every User Should Know

AutoCAD. Secrets Every User Should Know

Dan Abbott

"I've been using AutoCAD for 22 years and have written a hundred books on the subject. I reviewed many CAD books back in the days when book reviews were common in CAD publications; some were innovative, others were just sad. But for nearly a...
Eldad  Eilam. Reversing. Secrets of Reverse Engineering

Reversing. Secrets of Reverse Engineering

Eldad Eilam

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth...
Matthew  Strebe. Network Security Foundations. Technology Fundamentals for IT Success

Network Security Foundations. Technology Fundamentals for IT Success

Matthew Strebe

The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is...
Kirk  McElhearn. The Mac OS X Command Line. Unix Under the Hood

The Mac OS X Command Line. Unix Under the Hood

Kirk McElhearn

The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major...
Mark Chambers L.. Apple TV For Dummies

Apple TV For Dummies

Mark Chambers L.

Watch your iTunes downloads on a television screen with help from Apple TV For Dummies. This comprehensive guide offers shopping tips; easy-to-understand installation and setup directions; and advanced material like content creation,...
Kevin Hanegan. Custom CGI Scripting with Perl

Custom CGI Scripting with Perl

Kevin Hanegan

The only one-stop resource for Web developers and programmers This book is an indispensable resource for Web developers and programmers who program CGI applications in Perl. It is designed to function as both a comprehensive reference to the...
Denny  Atkin. Sony CLI? For Dummies

Sony CLI? For Dummies

Denny Atkin

Shows users how to make the most of Sony's popular Palm OS PDA, the CLIE Sony holds the second largest share of the U.S. PDA market-12.1 percent Guides new and intermediate users through the all the latest CLIE features and functions, from using...
Эрик Мэтиз. Изучаем Python. Программирование игр, визуализация данных, веб-приложения (pdf+epub)

Изучаем Python. Программирование игр, визуализация данных, веб-приложения (pdf+epub)

Эрик Мэтиз

«Изучаем Python» – это самое популярное в мире руководство по языку Python. Вы сможете не только максимально быстро его освоить, но и научитесь писать программы, устранять ошибки и создавать работающие приложения. В первой части книги вы...
Henry Liu H.. Oracle Database Performance and Scalability. A Quantitative Approach

Oracle Database Performance and Scalability. A Quantitative Approach

Henry Liu H.

The innovative performance and scalability features with each newer edition of the Oracle database system can present challenges for users. This book teaches software developers and students how to effectively deal with Oracle performance and...
Akira  Hirose. Complex-Valued Neural Networks. Advances and Applications

Complex-Valued Neural Networks. Advances and Applications

Akira Hirose

Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applications Complex-valued neural networks is a rapidly developing neural network framework that utilizes complex arithmetic,...
Lynn Batten Margaret. Public Key Cryptography. Applications and Attacks

Public Key Cryptography. Applications and Attacks

Lynn Batten Margaret

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of...
Vincent  Mahout. Assembly Language Programming. ARM Cortex-M3

Assembly Language Programming. ARM Cortex-M3

Vincent Mahout

ARM designs the cores of microcontrollers which equip most “embedded systems” based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly...
Mario Moreira E.. Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed

Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed

Mario Moreira E.

Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E....
Andreas  Rueping. Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation

Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation

Andreas Rueping

A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web platforms have specific requirements that go beyond standard functionality; to meet such requirements, it's often necessary...
Paul  Sanghera. Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists

Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists

Paul Sanghera

Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science,...
Alexis Vos De. Reversible Computing. Fundamentals, Quantum Computing, and Applications

Reversible Computing. Fundamentals, Quantum Computing, and Applications

Alexis Vos De

Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in...
Mark Maybury T.. Multimedia Information Extraction. Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

Multimedia Information Extraction. Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring

Mark Maybury T.

The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube) is driving a need not only for multimedia retrieval but also information extraction from and across media....
Gawdat  Bahgat. Energy Security. An Interdisciplinary Approach

Energy Security. An Interdisciplinary Approach

Gawdat Bahgat

Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives...
Daniel Larose T.. Discovering Knowledge in Data. An Introduction to Data Mining

Discovering Knowledge in Data. An Introduction to Data Mining

Daniel Larose T.

The field of data mining lies at the confluence of predictive analytics, statistical analysis, and business intelligence. Due to the ever-increasing complexity and size of data sets and the wide range of applications in computer science,...
Darius Dziuda M.. Data Mining for Genomics and Proteomics. Analysis of Gene and Protein Expression Data

Data Mining for Genomics and Proteomics. Analysis of Gene and Protein Expression Data

Darius Dziuda M.

Data Mining for Genomics and Proteomics uses pragmatic examples and a complete case study to demonstrate step-by-step how biomedical studies can be used to maximize the chance of extracting new and useful biomedical knowledge from data. It is an...
Indra  Gunawan. Fundamentals of Reliability Engineering. Applications in Multistage Interconnection Networks

Fundamentals of Reliability Engineering. Applications in Multistage Interconnection Networks

Indra Gunawan

This book presents fundamentals of reliability engineering with its applications in evaluating reliability of multistage interconnection networks. In the first part of the book, it introduces the concept of reliability engineering, elements of...
Oliver  Sturm. Functional Programming in C#. Classic Programming Techniques for Modern Projects

Functional Programming in C#. Classic Programming Techniques for Modern Projects

Oliver Sturm

Take advantage of the growing trend in functional programming. C# is the number-one language used by .NET developers and one of the most popular programming languages in the world. It has many built-in functional programming features, but most...
Daniel  Ventre. Cyber Conflict. Competing National Perspectives

Cyber Conflict. Competing National Perspectives

Daniel Ventre

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to...
Mehmed  Kantardzic. Data Mining. Concepts, Models, Methods, and Algorithms

Data Mining. Concepts, Models, Methods, and Algorithms

Mehmed Kantardzic

This book reviews state-of-the-art methodologies and techniques for analyzing enormous quantities of raw data in high-dimensional data spaces, to extract new information for decision making. The goal of this book is to provide a single...
Jacob  Seidelin. HTML5 Games. Creating Fun with HTML5, CSS3, and WebGL

HTML5 Games. Creating Fun with HTML5, CSS3, and WebGL

Jacob Seidelin

Discover new opportunities for building 2D and 3D games with HTML5 The newest iteration of HTML, HTML5 can be used with JavaScript, CSS3, and WebGL to create beautiful, unique, engaging games that can be played on the web or mobile devices like...
Dominic  Duggan. Enterprise Software Architecture and Design. Entities, Services, and Resources

Enterprise Software Architecture and Design. Entities, Services, and Resources

Dominic Duggan

This book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the «big picture». This book discusses SOA from the low-level perspective of middleware, various...
Anyong  Qing. Differential Evolution. Fundamentals and Applications in Electrical Engineering

Differential Evolution. Fundamentals and Applications in Electrical Engineering

Anyong Qing

Differential evolution is a very simple but very powerful stochastic optimizer. Since its inception, it has proved very efficient and robust in function optimization and has been applied to solve problems in many scientific and engineering...
Eric  Bauer. Design for Reliability. Information and Computer-Based Systems

Design for Reliability. Information and Computer-Based Systems

Eric Bauer

System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable...
Udo  Zolzer. DAFX. Digital Audio Effects

DAFX. Digital Audio Effects

Udo Zolzer

The rapid development in various fields of Digital Audio Effects, or DAFX, has led to new algorithms and this second edition of the popular book, DAFX: Digital Audio Effects has been updated throughout to reflect progress in the field. It...
Zhuo  Xu. Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL

Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL

Zhuo Xu

A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality...
Hong  Jeong. Architectures for Computer Vision. From Algorithm to Chip with Verilog

Architectures for Computer Vision. From Algorithm to Chip with Verilog

Hong Jeong

This book provides comprehensive coverage of 3D vision systems, from vision models and state-of-the-art algorithms to their hardware architectures for implementation on DSPs, FPGA and ASIC chips, and GPUs. It aims to fill the gaps between...
Bo Sand?n I.. Design of Multithreaded Software. The Entity-Life Modeling Approach

Design of Multithreaded Software. The Entity-Life Modeling Approach

Bo Sand?n I.

This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM focuses on «reactive systems,» which continuously...
Christophe  Lecoutre. Constraint Networks. Targeting Simplicity for Techniques and Algorithms

Constraint Networks. Targeting Simplicity for Techniques and Algorithms

Christophe Lecoutre

A major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research...
Bernd  Vowinkel. Maschinen mit Bewusstsein. Wohin F?hrt die K?nstliche Intelligenz?

Maschinen mit Bewusstsein. Wohin F?hrt die K?nstliche Intelligenz?

Bernd Vowinkel

Mochten Sie mit einem Roboter Handchen halten? Wie fuhlt sich das wohl an? Sind Bewusstsein und Emotionen konstruierbar – oder bleiben sie ein allein menschliches Privileg? Schon im Jahr 2015 sind PCs ahnlich leistungsfahig wie das menschliche...
Jean-Louis  Boulanger. Static Analysis of Software. The Abstract Interpretation

Static Analysis of Software. The Abstract Interpretation

Jean-Louis Boulanger

The existing literature currently available to students and researchers is very general, covering only the formal techniques of static analysis. This book presents real examples of the formal techniques called «abstract interpretation» currently...
Ying  Bai. Practical Database Programming With Visual C#.NET

Practical Database Programming With Visual C#.NET

Ying Bai

A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database programming with Visual C#.NET 2008 and in developing...
St?phane Tuff?ry. Data Mining and Statistics for Decision Making

Data Mining and Statistics for Decision Making

St?phane Tuff?ry

Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of...
Paulraj  Ponniah. Data Warehousing Fundamentals for IT Professionals

Data Warehousing Fundamentals for IT Professionals

Paulraj Ponniah

Cutting-edge content and guidance from a data warehousing expert—now expanded to reflect field trends Data warehousing has revolutionized the way businesses in a wide variety of industries perform analysis and make strategic decisions. Since the...
Timothy  Rooney. IP Address Management Principles and Practice

IP Address Management Principles and Practice

Timothy Rooney

This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host...
Brian Nejmeh A.. Service-Learning in the Computer and Information Sciences. Practical Applications in Engineering Education

Service-Learning in the Computer and Information Sciences. Practical Applications in Engineering Education

Brian Nejmeh A.

Offering a truly global perspective, this book serves as a road map for service-learning partnerships between information science and nonprofit organizations. It introduces for the first time an essential framework for service learning in CIS,...
Mark  Stamp. Information Security. Principles and Practice

Information Security. Principles and Practice

Mark Stamp

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more...
Pierre  Bonnet. Enterprise Data Governance. Reference and Master Data Management Semantic Modeling

Enterprise Data Governance. Reference and Master Data Management Semantic Modeling

Pierre Bonnet

In an increasingly digital economy, mastering the quality of data is an increasingly vital yet still, in most organizations, a considerable task. The necessity of better governance and reinforcement of international rules and regulatory or...
EMC Services Education. Information Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

Information Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

EMC Services Education

The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a...
Daniel  Minoli. Building the Internet of Things with IPv6 and MIPv6. The Evolving World of M2M Communications

Building the Internet of Things with IPv6 and MIPv6. The Evolving World of M2M Communications

Daniel Minoli

If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed...

Оставайтесь на связи

Будьте в курсе новостей о выходящих книгах, подпишитесь на нашу еженедельную рассылку:
© 2011-2024. Your Lib. All Rights Reserved.