зарубежная компьютерная литература

Fernando Lagrana. E-mail and Behavioral Changes

E-mail and Behavioral Changes

Fernando Lagrana

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented....
Bill Woodward. Fiber Optics Installer (FOI) Certification Exam Guide

Fiber Optics Installer (FOI) Certification Exam Guide

Bill Woodward

Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundation in fiber optics and thorough preparation for the Fiber Optics Installer (FOI) certification....
Colin Bookham. Versatile Routing and Services with BGP

Versatile Routing and Services with BGP

Colin Bookham

Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a...
Ken Chen. Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Ken Chen

This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the...
Maryse Salles. Decision-Making and the Information System

Decision-Making and the Information System

Maryse Salles

The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions...
Группа авторов. Cyber-Assurance for the Internet of Things

Cyber-Assurance for the Internet of Things

Группа авторов

Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security...
Adam Lindsay Gordon. The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK

Adam Lindsay Gordon

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second...
Jeff Kosseff. Cybersecurity Law

Cybersecurity Law

Jeff Kosseff

A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws...
Daniel Ventre. Information Warfare

Information Warfare

Daniel Ventre

Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and...
Elsa N?gre. Information and Recommender Systems

Information and Recommender Systems

Elsa N?gre

Information is an element of knowledge that can be stored, processed or transmitted. It is linked to concepts of communication, data, knowledge or representation. In a context of steady increase in the mass of information it is difficult to know...
Fernando Iafrate. From Big Data to Smart Data

From Big Data to Smart Data

Fernando Iafrate

A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and the Smart Data (what it is for). Today’s decision making can be reached via information (related to the data), knowledge (related to people and...
Jerome Beranger. Medical Information Systems Ethics

Medical Information Systems Ethics

Jerome Beranger

The exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of issues surrounding health IT. The proper use of these communication tools, such as telemedicine,...
Eric Bauer. Lean Computing for the Cloud

Lean Computing for the Cloud

Eric Bauer

Applies lean manufacturing principles across the cloud service delivery chain to enable application and infrastructure service providers to sustainably achieve the shortest lead time, best quality, and value Applies lean thinking across the...
G?rald Bronner. Belief and Misbelief Asymmetry on the Internet

Belief and Misbelief Asymmetry on the Internet

G?rald Bronner

This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring with indignant fascination the idea of a machination against truth set up to serve a society of...
Mun?o Kitajima. Memory and Action Selection in Human-Machine Interaction

Memory and Action Selection in Human-Machine Interaction

Mun?o Kitajima

The first goal of this book is to extend Two Minds originating from behavioral economics to the domain of interaction, where the time dimension has to be dealt with rigorously; in human–machine interaction, it is of crucial importance how...
Mona Ben Chouikha. Organizational Design for Knowledge Management

Organizational Design for Knowledge Management

Mona Ben Chouikha

Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the...
Andr? Vitalis. The Uncertain Digital Revolution

The Uncertain Digital Revolution

Andr? Vitalis

Digital information and communication technologies can be seen as a threat to privacy, a step forward for freedom of expression and communication, a tool in the fight against terrorism or the source of a new economic wealth. Computerization has...
Andr? Liem. Prospective Ergonomics

Prospective Ergonomics

Andr? Liem

This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science....
Fr?d?ric Magoules. Data Mining and Machine Learning in Building Energy Analysis

Data Mining and Machine Learning in Building Energy Analysis

Fr?d?ric Magoules

Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial Intelligence for Building Energy Analysis reviews recently developed models for solving these issues, including detailed and simplified...
Qing  Li. Security Intelligence

Security Intelligence

Qing Li

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables,...
Saoussen Krichen. Graph-related Optimization and Decision Support Systems

Graph-related Optimization and Decision Support Systems

Saoussen Krichen

Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two...
Guenter Schaefer. Security in Fixed and Wireless Networks

Security in Fixed and Wireless Networks

Guenter Schaefer

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate...
Kai  Hwang. Big-Data Analytics for Cloud, IoT and Cognitive Computing

Big-Data Analytics for Cloud, IoT and Cognitive Computing

Kai Hwang

The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that...
Elaine  Marmel. QuickBooks Online For Dummies

QuickBooks Online For Dummies

Elaine Marmel

Organise business finances with the latest cloud-based accounting innovation QuickBooks Online For Dummies, Australian Edition is your key guide to getting business finances under control. From budgeting and payroll to tax, inventory, accounts...
Elias  Bachaalany. The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

Elias Bachaalany

Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be...
Karim Said. Asymmetric Alliances and Information Systems

Asymmetric Alliances and Information Systems

Karim Said

This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value...
Herv? Suzanne. Collective Intelligence Development in Business

Collective Intelligence Development in Business

Herv? Suzanne

This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relational processes. The purpose is to help the reader become a better Collective Intelligence Leader,...
Dominique Paret. Secure Connected Objects

Secure Connected Objects

Dominique Paret

In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected...
Jean-Fabrice Lebraty. Crowdsourcing

Crowdsourcing

Jean-Fabrice Lebraty

Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new...
Группа авторов. Collective Intelligence and Digital Archives

Collective Intelligence and Digital Archives

Группа авторов

The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to...
Группа авторов. Designing Interactive Hypermedia Systems

Designing Interactive Hypermedia Systems

Группа авторов

This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social...
Eric Bauer. Service Quality of Cloud-Based Applications

Service Quality of Cloud-Based Applications

Eric Bauer

This book explains why applications running on cloud might not deliver the same service reliability, availability, latency and overall quality to end users as they do when the applications are running on traditional (non-virtualized, non-cloud)...
Xiaodong Lin. Vehicular Ad Hoc Network Security and Privacy

Vehicular Ad Hoc Network Security and Privacy

Xiaodong Lin

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues...
Saoussen Krichen. Supply Chain Management and its Applications in Computer Science

Supply Chain Management and its Applications in Computer Science

Saoussen Krichen

Supply chain management is a key topic for a large variety of strategic decision problems. It is essential in making efficient decisions related to the management of inventory and the delivery of final products to customers. The focus of this...
Jie Wang. Introduction to Network Security

Introduction to Network Security

Jie Wang

Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security...
Группа авторов. Brain-Computer Interfaces 2

Brain-Computer Interfaces 2

Группа авторов

Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibilities for investigation and application. This book provides keys for understanding and designing...
Группа авторов. Information Systems for Knowledge Management

Information Systems for Knowledge Management

Группа авторов

More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their experience and accumulated knowledge about the firm activities. However, considering the large...
Glenn Warnock. Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide

Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide

Glenn Warnock

A comprehensive resource for professionals preparing for Alcatel-Lucent Service Routing Architect (SRA) certification Networking professionals are taking note of Alcatel-Lucent and its quick ascent in the networking and telecom industries. IP...
Gabriel M. de Brito. Information-Centric Networks

Information-Centric Networks

Gabriel M. de Brito

Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that...
Группа авторов. Breaking Teleprinter Ciphers at Bletchley Park

Breaking Teleprinter Ciphers at Bletchley Park

Группа авторов

This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only...
Pierre-Emmanuel Arduin. Information and Knowledge System

Information and Knowledge System

Pierre-Emmanuel Arduin

The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions...
Philippe Capet. Information Evaluation

Information Evaluation

Philippe Capet

During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount...
G?rald Kembellec. Recommender Systems

Recommender Systems

G?rald Kembellec

Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendation systems are key elements of digital strategies. If development was originally intended for the performance of information systems, the issues...
Jean-Louis Leignel. Digital Transformation

Digital Transformation

Jean-Louis Leignel

The main aim of this book is to offer companies a simple and practical method to assess their maturity in the Governance Information System, so that they are in working order to face the challenges of Digital Transformation. How can companies...
Jean-Charles Pomerol. MOOCs

MOOCs

Jean-Charles Pomerol

MOOCs (Massive Online Open Courses) are shaking up the traditional forms of primary and continuing education and training. These new distance teaching tools which take advantage of the Web and social network revolution are making us think again...
Igor Faynberg. Cloud Computing

Cloud Computing

Igor Faynberg

Cloud Computing: Business Trends and Technologies provides a broad introduction to Cloud computing technologies and their applications to IT and telecommunications businesses (i.e., the network function virtualization, NFV). To this end, the...
Renaud Fabre. New Challenges for Knowledge

New Challenges for Knowledge

Renaud Fabre

Digital technologies are reshaping every field of social and economic lives, so do they in the world of scientific knowledge. “The New Challenges of Knowledge” aims at understanding how the new digital technologies alter the production,...
Группа авторов. Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Группа авторов

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community...
Michael Hale Ligh. The Art of Memory Forensics

The Art of Memory Forensics

Michael Hale Ligh

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts...
Ga?lle Calvary. Computer Science and Ambient Intelligence

Computer Science and Ambient Intelligence

Ga?lle Calvary

This book focuses on ambient intelligence and addresses various issues related to data management, networking and HCI in this context. Taking a holistic view, it covers various levels of abstraction, ranging from fundamental to advanced concepts...

Оставайтесь на связи

Будьте в курсе новостей о выходящих книгах, подпишитесь на нашу еженедельную рассылку:
© 2011-2024. Your Lib. All Rights Reserved.