зарубежная компьютерная литература

Lodhi Huma M.. Elements of Computational Systems Biology

Elements of Computational Systems Biology

Lodhi Huma M.

Groundbreaking, long-ranging research in this emergent field that enables solutions to complex biological problems Computational systems biology is an emerging discipline that is evolving quickly due to recent advances in biology such as genome...
Nicholson J.. Codecharts. Roadmaps and blueprints for object-oriented programs

Codecharts. Roadmaps and blueprints for object-oriented programs

Nicholson J.

NEW LANGUAGE VISUALIZES PROGRAM ABSTRACTIONS CLEARLY AND PRECISELY Popular software modelling notations visualize implementation minutiae but fail to scale, to capture design abstractions, and to deliver effective tool support. Tailored to...
Arboleda Hugo. Model-Driven and Software Product Line Engineering

Model-Driven and Software Product Line Engineering

Arboleda Hugo

Many approaches to creating Software Product Lines have emerged that are based on Model-Driven Engineering. This book introduces both Software Product Lines and Model-Driven Engineering, which have separate success stories in industry, and...
Cayirci Erdal. Computer Assisted Exercises and Training. A Reference Guide

Computer Assisted Exercises and Training. A Reference Guide

Cayirci Erdal

A comprehensive guide to computer assisted exercises Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and...
Upton Eben. Raspberry Pi User Guide

Raspberry Pi User Guide

Upton Eben

The essential guide to getting started with the Raspberry Pi ® The Raspberry Pi has been a success beyond the dream of its creators. Their goal, to encourage a new generation of computer programmers who understand how computers work, is well...
Blanchet G?rard. Computer Architecture

Computer Architecture

Blanchet G?rard

This book lays out the concepts necessary to understand how a computer works. For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This...
Wu Dongrui. Perceptual Computing. Aiding People in Making Subjective Judgments

Perceptual Computing. Aiding People in Making Subjective Judgments

Wu Dongrui

Explains for the first time how «computing with words» can aid in making subjective judgments Lotfi Zadeh, the father of fuzzy logic, coined the phrase «computing with words» (CWW) to describe a methodology in which the objects of computation...
Mili Ali. Software Testing. Concepts and Operations

Software Testing. Concepts and Operations

Mili Ali

Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test management This book...
Wagner Kevin. Proportionate-type Normalized Least Mean Square Algorithms

Proportionate-type Normalized Least Mean Square Algorithms

Wagner Kevin

The topic of this book is proportionate-type normalized least mean squares (PtNLMS) adaptive filtering algorithms, which attempt to estimate an unknown impulse response by adaptively giving gains proportionate to an estimate of the impulse...
Bubendorfer Kris. Market-Oriented Grid and Utility Computing

Market-Oriented Grid and Utility Computing

Bubendorfer Kris

The first single-source reference covering the state of the art in grid and utility computing economy research This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main...
Puechmorel St?phane. Modeling and Optimization of Air Traffic

Modeling and Optimization of Air Traffic

Puechmorel St?phane

This book combines the research activities of the authors, both of whom are researchers at Ecole Nationale de l’Aviation Civile (French National School of Civil Aviation), and presents their findings from the last 15 years. Their work uses air...
Elder Ken. Phase-Field Methods in Materials Science and Engineering

Phase-Field Methods in Materials Science and Engineering

Elder Ken

This comprehensive and self-contained, one-stop source discusses phase-field methodology in a fundamental way, explaining advanced numerical techniques for solving phase-field and related continuum-field models. It also presents numerical...
Panetto Herve. Interoperability for Enterprise Software and Applications. Proceedings of the Workshops and the Doctorial Symposium of the I-ESA International Conference 2010

Interoperability for Enterprise Software and Applications. Proceedings of the Workshops and the Doctorial Symposium of the I-ESA International Conference 2010

Panetto Herve

Within the framework of the Sixth I-ESA International Conference, supported by the INTEROP VLab (International Virtual Laboratory on Enterprise Interoperability, http://www.interop-vlab.eu), three workshops and a Doctoral Symposium have been...
Filo Orna. Information Processing by Biochemical Systems. Neural Network-Type Configurations

Information Processing by Biochemical Systems. Neural Network-Type Configurations

Filo Orna

A Research-Driven Resource on Building Biochemical Systems to Perform Information Processing Functions Information Processing by Biochemical Systems describes fully delineated biochemical systems, organized as neural network–type assemblies. It...
Beckers Benoit. Reconciliation of Geometry and Perception in Radiation Physics

Reconciliation of Geometry and Perception in Radiation Physics

Beckers Benoit

Reconciliation of Geometry and Perception in Radiation Physics approaches the topic of projective geometry as it applies to radiation physics and attempts to negate its negative reputation. With an original outlook and transversal approach, the...
He Matthew. Mathematics of Bioinformatics. Theory, Methods and Applications

Mathematics of Bioinformatics. Theory, Methods and Applications

He Matthew

Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences,...
Choi Jung-Woo. Sound Visualization and Manipulation

Sound Visualization and Manipulation

Choi Jung-Woo

Unique in addressing two different problems – sound visualization and manipulation – in a unified way Advances in signal processing technology are enabling ever more accurate visualization of existing sound fields and precisely defined sound...
Naik Kshirasagar. Software Evolution and Maintenance

Software Evolution and Maintenance

Naik Kshirasagar

Provides students and engineers with the fundamental developments and common practices of software evolution and maintenance Software Evolution and Maintenance: A Practitioner’s Approach introduces readers to a set of well-rounded educational...
Dooley Michael. IPv6 Deployment and Management

IPv6 Deployment and Management

Dooley Michael

With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations,...
Bichot Charles-Edmond. Graph Partitioning

Graph Partitioning

Bichot Charles-Edmond

Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly...
Fumy Walter. Handbook of eID Security. Concepts, Practical Experiences, Technologies

Handbook of eID Security. Concepts, Practical Experiences, Technologies

Fumy Walter

In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as...
Mamishev Alexander. Technical Writing for Teams. The STREAM Tools Handbook

Technical Writing for Teams. The STREAM Tools Handbook

Mamishev Alexander

A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need...
Kostadinov Todor Pavlov. Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation

Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation

Kostadinov Todor Pavlov

Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology...
Кевин Скотт Проктор. Бюджетирование и финансовые расчеты с помощью Microsoft Excel

Бюджетирование и финансовые расчеты с помощью Microsoft Excel

Кевин Скотт Проктор

Эта книга представляет собой практическое руководство по использованию мощного инструмента (Microsoft Excel) для выполнения любой сложной задачи, например, построения финансовой модели. Кратко и внятно рассказывается об использовании электронных...
Lynn Batten Margaret. Public Key Cryptography. Applications and Attacks

Public Key Cryptography. Applications and Attacks

Lynn Batten Margaret

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of...
Gawdat  Bahgat. Energy Security. An Interdisciplinary Approach

Energy Security. An Interdisciplinary Approach

Gawdat Bahgat

Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives...
Alexis Vos De. Reversible Computing. Fundamentals, Quantum Computing, and Applications

Reversible Computing. Fundamentals, Quantum Computing, and Applications

Alexis Vos De

Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in...
Luonan Chen. Biomolecular Networks

Biomolecular Networks

Luonan Chen

Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular...
Mark  Stamp. Information Security. Principles and Practice

Information Security. Principles and Practice

Mark Stamp

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more...
Granino Korn A.. Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies

Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies

Granino Korn A.

A unique, hands-on guide to interactive modeling and simulation of engineering systems This book describes advanced, cutting-edge techniques for dynamic system simulation using the DESIRE modeling/simulation software package. It offers detailed...
Pascale Vicat-Blanc. Computing Networks

Computing Networks

Pascale Vicat-Blanc

“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to...
Группа авторов. Cloud Computing

Cloud Computing

Группа авторов

The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global...
Alexander  Bachmutsky. System Design for Telecommunication Gateways

System Design for Telecommunication Gateways

Alexander Bachmutsky

System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs...
Alain  Abran. Software Metrics and Software Metrology

Software Metrics and Software Metrology

Alain Abran

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to...
Pradeep K. Sinha. Electronic Health Record

Electronic Health Record

Pradeep K. Sinha

Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT...
Martin Sykes. Stories that Move Mountains

Stories that Move Mountains

Martin Sykes

Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success, until now. Developed over a twelve year period as a presentation method to help Enterprise...
Christian Vogt. Advanced Internet Protocols, Services, and Applications

Advanced Internet Protocols, Services, and Applications

Christian Vogt

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based...
Jennifer L. Bayuk. Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

Jennifer L. Bayuk

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great...
Zach  Lanier. Android Hacker's Handbook

Android Hacker's Handbook

Zach Lanier

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who...
EMC Services Education. Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data

Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data

EMC Services Education

Data Science and Big Data Analytics is about harnessing the power of data for new insights. The book covers the breadth of activities and methods and tools that Data Scientists use. The content focuses on concepts, principles and practical...
Michael Gregg. The Network Security Test Lab

The Network Security Test Lab

Michael Gregg

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack...
Joseph Henrotin. The Art of War in the Network Age

The Art of War in the Network Age

Joseph Henrotin

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the...
David Bertolo. Interactions on Digital Tablets in the Context of 3D Geometry Learning

Interactions on Digital Tablets in the Context of 3D Geometry Learning

David Bertolo

Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main...
Matthew Monte. Network Attacks and Exploitation

Network Attacks and Exploitation

Matthew Monte

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and...
Ying Tan. Artificial Immune System

Artificial Immune System

Ying Tan

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current...
Adam Shostack. Threat Modeling

Threat Modeling

Adam Shostack

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a...
Mehmet Sahinoglu. Cyber-Risk Informatics

Cyber-Risk Informatics

Mehmet Sahinoglu

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based...
Dom Robinson. Content Delivery Networks

Content Delivery Networks

Dom Robinson

The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and...
Everardo Reyes-Garcia. The Image-Interface

The Image-Interface

Everardo Reyes-Garcia

Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is...
Chris Binnie. Linux Server Security

Linux Server Security

Chris Binnie

Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced...

Оставайтесь на связи

Будьте в курсе новостей о выходящих книгах, подпишитесь на нашу еженедельную рассылку:
© 2011-2024. Your Lib. All Rights Reserved.