зарубежная компьютерная литература

Faithe Wempen. Computing Fundamentals

Computing Fundamentals

Faithe Wempen

Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft...
Tarek Samara. ERP and Information Systems

ERP and Information Systems

Tarek Samara

This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems...
Thomas J. Mowbray. Cybersecurity

Cybersecurity

Thomas J. Mowbray

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other...
Sanjay Kumar Chaturvedi. Network Reliability

Network Reliability

Sanjay Kumar Chaturvedi

In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The present text is aimed at providing modelling and analysis techniques for the evaluation of...
Jean-Max Noyer. Transformation of Collective Intelligences

Transformation of Collective Intelligences

Jean-Max Noyer

There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are...
Stuart Jacobs. Security Management of Next Generation Telecommunications Networks and Services

Security Management of Next Generation Telecommunications Networks and Services

Stuart Jacobs

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive...
Kar?n Fort. Collaborative Annotation for Reliable Natural Language Processing

Collaborative Annotation for Reliable Natural Language Processing

Kar?n Fort

This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success...
Nicolas Turenne. Knowledge Needs and Information Extraction

Knowledge Needs and Information Extraction

Nicolas Turenne

This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which...
Группа авторов. Competitive Intelligence and Decision Problems

Competitive Intelligence and Decision Problems

Группа авторов

The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when interpreting results,...
Группа авторов. Bioinformatics in Aquaculture

Bioinformatics in Aquaculture

Группа авторов

Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed and, whenever possible, associated with experimental results from various sources, to draw...
Garth O. Bruen. WHOIS Running the Internet

WHOIS Running the Internet

Garth O. Bruen

Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its...
Fernando Lagrana. E-mail and Behavioral Changes

E-mail and Behavioral Changes

Fernando Lagrana

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented....
Bill Woodward. Fiber Optics Installer (FOI) Certification Exam Guide

Fiber Optics Installer (FOI) Certification Exam Guide

Bill Woodward

Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundation in fiber optics and thorough preparation for the Fiber Optics Installer (FOI) certification....
Colin Bookham. Versatile Routing and Services with BGP

Versatile Routing and Services with BGP

Colin Bookham

Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a...
Ken Chen. Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Ken Chen

This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the...
Maryse Salles. Decision-Making and the Information System

Decision-Making and the Information System

Maryse Salles

The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions...
Группа авторов. Cyber-Assurance for the Internet of Things

Cyber-Assurance for the Internet of Things

Группа авторов

Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security...
Adam Lindsay Gordon. The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK

Adam Lindsay Gordon

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second...
Jeff Kosseff. Cybersecurity Law

Cybersecurity Law

Jeff Kosseff

A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws...
Daniel Ventre. Information Warfare

Information Warfare

Daniel Ventre

Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and...
Elsa N?gre. Information and Recommender Systems

Information and Recommender Systems

Elsa N?gre

Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or representation. In a context of steady increase in the mass of information it is difficult to know...
Fernando Iafrate. From Big Data to Smart Data

From Big Data to Smart Data

Fernando Iafrate

A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision making can be reached via information (related to the data), knowledge (related to people and...
Jerome Beranger. Medical Information Systems Ethics

Medical Information Systems Ethics

Jerome Beranger

The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of issues surrounding health IT. The proper use of these communication tools, such as telemedicine,...
Eric Bauer. Lean Computing for the Cloud

Lean Computing for the Cloud

Eric Bauer

Applies lean manufacturing principles across the cloud service delivery chain to enable application and infrastructure service providers to sustainably achieve the shortest lead time, best quality, and value Applies lean thinking across the...
G?rald Bronner. Belief and Misbelief Asymmetry on the Internet

Belief and Misbelief Asymmetry on the Internet

G?rald Bronner

This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring with indignant fascination the idea of a machination against truth set up to serve a society of...
Mun?o Kitajima. Memory and Action Selection in Human-Machine Interaction

Memory and Action Selection in Human-Machine Interaction

Mun?o Kitajima

The first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how...
Mona Ben Chouikha. Organizational Design for Knowledge Management

Organizational Design for Knowledge Management

Mona Ben Chouikha

Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the...
Andr? Vitalis. The Uncertain Digital Revolution

The Uncertain Digital Revolution

Andr? Vitalis

Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has...
Andr? Liem. Prospective Ergonomics

Prospective Ergonomics

Andr? Liem

This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science....
Fr?d?ric Magoules. Data Mining and Machine Learning in Building Energy Analysis

Data Mining and Machine Learning in Building Energy Analysis

Fr?d?ric Magoules

Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial Intelligence for Building Energy Analysis reviews recently developed models for solving these issues, including detailed and simplified...
Qing  Li. Security Intelligence

Security Intelligence

Qing Li

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...
Saoussen Krichen. Graph-related Optimization and Decision Support Systems

Graph-related Optimization and Decision Support Systems

Saoussen Krichen

Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two...
Guenter Schaefer. Security in Fixed and Wireless Networks

Security in Fixed and Wireless Networks

Guenter Schaefer

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate...
Kai  Hwang. Big-Data Analytics for Cloud, IoT and Cognitive Computing

Big-Data Analytics for Cloud, IoT and Cognitive Computing

Kai Hwang

The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that...
Elaine  Marmel. QuickBooks Online For Dummies

QuickBooks Online For Dummies

Elaine Marmel

Organise business finances with the latest cloud-based accounting innovation QuickBooks Online For Dummies, Australian Edition is your key guide to getting business finances under control. From budgeting and payroll to tax, inventory, accounts...
Elias  Bachaalany. The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

Elias Bachaalany

Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be...
Karim Said. Asymmetric Alliances and Information Systems

Asymmetric Alliances and Information Systems

Karim Said

This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value...
Herv? Suzanne. Collective Intelligence Development in Business

Collective Intelligence Development in Business

Herv? Suzanne

This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relational processes. The purpose is to help the reader become a better Collective Intelligence Leader,...
Dominique Paret. Secure Connected Objects

Secure Connected Objects

Dominique Paret

In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected...
Jean-Fabrice Lebraty. Crowdsourcing

Crowdsourcing

Jean-Fabrice Lebraty

Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new...
Группа авторов. Collective Intelligence and Digital Archives

Collective Intelligence and Digital Archives

Группа авторов

The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to...
Группа авторов. Designing Interactive Hypermedia Systems

Designing Interactive Hypermedia Systems

Группа авторов

This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social...
Eric Bauer. Service Quality of Cloud-Based Applications

Service Quality of Cloud-Based Applications

Eric Bauer

This book explains why applications running on cloud might not deliver the same service reliability, availability, latency and overall quality to end users as they do when the applications are running on traditional (non-virtualized, non-cloud)...
Xiaodong Lin. Vehicular Ad Hoc Network Security and Privacy

Vehicular Ad Hoc Network Security and Privacy

Xiaodong Lin

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues...
Saoussen Krichen. Supply Chain Management and its Applications in Computer Science

Supply Chain Management and its Applications in Computer Science

Saoussen Krichen

Supply chain management is a key topic for a large variety of strategic decision problems. It is essential in making efficient decisions related to the management of inventory and the delivery of final products to customers. The focus of this...
Jie Wang. Introduction to Network Security

Introduction to Network Security

Jie Wang

Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security...
Группа авторов. Brain-Computer Interfaces 2

Brain-Computer Interfaces 2

Группа авторов

Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibilities for investigation and application. This book provides keys for understanding and designing...
Группа авторов. Information Systems for Knowledge Management

Information Systems for Knowledge Management

Группа авторов

More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their experience and accumulated knowledge about the firm activities. However, considering the large...
Glenn Warnock. Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide

Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide

Glenn Warnock

A comprehensive resource for professionals preparing for Alcatel-Lucent Service Routing Architect (SRA) certification Networking professionals are taking note of Alcatel-Lucent and its quick ascent in the networking and telecom industries. IP...
Gabriel M. de Brito. Information-Centric Networks

Information-Centric Networks

Gabriel M. de Brito

Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that...

Оставайтесь на связи

Будьте в курсе новостей о выходящих книгах, подпишитесь на нашу еженедельную рассылку:
© 2011-2024. Your Lib. All Rights Reserved.