зарубежная компьютерная литература

Jeff Kosseff. Cybersecurity Law

Cybersecurity Law

Jeff Kosseff

A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws...
Adam Lindsay Gordon. The Official (ISC)2 Guide to the CCSP CBK

The Official (ISC)2 Guide to the CCSP CBK

Adam Lindsay Gordon

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second...
Группа авторов. Cyber-Assurance for the Internet of Things

Cyber-Assurance for the Internet of Things

Группа авторов

Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security...
Maryse Salles. Decision-Making and the Information System

Decision-Making and the Information System

Maryse Salles

The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions...
Ken Chen. Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Performance Evaluation by Simulation and Analysis with Applications to Computer Networks

Ken Chen

This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the...
Colin Bookham. Versatile Routing and Services with BGP

Versatile Routing and Services with BGP

Colin Bookham

Design a robust BGP control plane within a secure, scalable network for smoother services A robust Border Gateway Protocol setup is vital to ensuring reliable connectivity, an essential capability for any organization. The Internet has become a...
Bill Woodward. Fiber Optics Installer (FOI) Certification Exam Guide

Fiber Optics Installer (FOI) Certification Exam Guide

Bill Woodward

Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Certification Exam Guide gives you a solid foundation in fiber optics and thorough preparation for the Fiber Optics Installer (FOI) certification....
Fernando Lagrana. E-mail and Behavioral Changes

E-mail and Behavioral Changes

Fernando Lagrana

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented....
Garth O. Bruen. WHOIS Running the Internet

WHOIS Running the Internet

Garth O. Bruen

Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its...
Группа авторов. Bioinformatics in Aquaculture

Bioinformatics in Aquaculture

Группа авторов

Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed and, whenever possible, associated with experimental results from various sources, to draw...
Группа авторов. Competitive Intelligence and Decision Problems

Competitive Intelligence and Decision Problems

Группа авторов

The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when interpreting results,...
Nicolas Turenne. Knowledge Needs and Information Extraction

Knowledge Needs and Information Extraction

Nicolas Turenne

This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which...
Kar?n Fort. Collaborative Annotation for Reliable Natural Language Processing

Collaborative Annotation for Reliable Natural Language Processing

Kar?n Fort

This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success...
Stuart Jacobs. Security Management of Next Generation Telecommunications Networks and Services

Security Management of Next Generation Telecommunications Networks and Services

Stuart Jacobs

This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive...
Jean-Max Noyer. Transformation of Collective Intelligences

Transformation of Collective Intelligences

Jean-Max Noyer

There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are...
Sanjay Kumar Chaturvedi. Network Reliability

Network Reliability

Sanjay Kumar Chaturvedi

In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The present text is aimed at providing modelling and analysis techniques for the evaluation of...
Thomas J. Mowbray. Cybersecurity

Cybersecurity

Thomas J. Mowbray

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other...
Tarek Samara. ERP and Information Systems

ERP and Information Systems

Tarek Samara

This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems...
Faithe Wempen. Computing Fundamentals

Computing Fundamentals

Faithe Wempen

Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft...
Chris Binnie. Linux Server Security

Linux Server Security

Chris Binnie

Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced...
Everardo Reyes-Garcia. The Image-Interface

The Image-Interface

Everardo Reyes-Garcia

Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is...
Dom Robinson. Content Delivery Networks

Content Delivery Networks

Dom Robinson

The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and...
Mehmet Sahinoglu. Cyber-Risk Informatics

Cyber-Risk Informatics

Mehmet Sahinoglu

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based...
Adam Shostack. Threat Modeling

Threat Modeling

Adam Shostack

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a...
Ying Tan. Artificial Immune System

Artificial Immune System

Ying Tan

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current...
Matthew Monte. Network Attacks and Exploitation

Network Attacks and Exploitation

Matthew Monte

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and...
David Bertolo. Interactions on Digital Tablets in the Context of 3D Geometry Learning

Interactions on Digital Tablets in the Context of 3D Geometry Learning

David Bertolo

Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main...
Joseph Henrotin. The Art of War in the Network Age

The Art of War in the Network Age

Joseph Henrotin

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the...
Michael Gregg. The Network Security Test Lab

The Network Security Test Lab

Michael Gregg

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack...
EMC Services Education. Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data

Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data

EMC Services Education

Data Science and Big Data Analytics is about harnessing the power of data for new insights. The book covers the breadth of activities and methods and tools that Data Scientists use. The content focuses on concepts, principles and practical...
Zach  Lanier. Android Hacker's Handbook

Android Hacker's Handbook

Zach Lanier

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who...
Jennifer L. Bayuk. Cyber Security Policy Guidebook

Cyber Security Policy Guidebook

Jennifer L. Bayuk

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great...
Christian Vogt. Advanced Internet Protocols, Services, and Applications

Advanced Internet Protocols, Services, and Applications

Christian Vogt

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based...
Martin Sykes. Stories that Move Mountains

Stories that Move Mountains

Martin Sykes

Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success, until now. Developed over a twelve year period as a presentation method to help Enterprise...
Pradeep K. Sinha. Electronic Health Record

Electronic Health Record

Pradeep K. Sinha

Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT...
Alain  Abran. Software Metrics and Software Metrology

Software Metrics and Software Metrology

Alain Abran

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to...
Alexander  Bachmutsky. System Design for Telecommunication Gateways

System Design for Telecommunication Gateways

Alexander Bachmutsky

System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs...
Группа авторов. Cloud Computing

Cloud Computing

Группа авторов

The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global...
Pascale Vicat-Blanc. Computing Networks

Computing Networks

Pascale Vicat-Blanc

“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to...
Granino Korn A.. Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies

Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies

Granino Korn A.

A unique, hands-on guide to interactive modeling and simulation of engineering systems This book describes advanced, cutting-edge techniques for dynamic system simulation using the DESIRE modeling/simulation software package. It offers detailed...
Mark  Stamp. Information Security. Principles and Practice

Information Security. Principles and Practice

Mark Stamp

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more...
Luonan Chen. Biomolecular Networks

Biomolecular Networks

Luonan Chen

Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular...
Alexis Vos De. Reversible Computing. Fundamentals, Quantum Computing, and Applications

Reversible Computing. Fundamentals, Quantum Computing, and Applications

Alexis Vos De

Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in...
Gawdat  Bahgat. Energy Security. An Interdisciplinary Approach

Energy Security. An Interdisciplinary Approach

Gawdat Bahgat

Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives...
Lynn Batten Margaret. Public Key Cryptography. Applications and Attacks

Public Key Cryptography. Applications and Attacks

Lynn Batten Margaret

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of...
Кевин Скотт Проктор. Бюджетирование и финансовые расчеты с помощью Microsoft Excel

Бюджетирование и финансовые расчеты с помощью Microsoft Excel

Кевин Скотт Проктор

Эта книга представляет собой практическое руководство по использованию мощного инструмента (Microsoft Excel) для выполнения любой сложной задачи, например, построения финансовой модели. Кратко и внятно рассказывается об использовании электронных...
Kostadinov Todor Pavlov. Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation

Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation

Kostadinov Todor Pavlov

Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology...
Mamishev Alexander. Technical Writing for Teams. The STREAM Tools Handbook

Technical Writing for Teams. The STREAM Tools Handbook

Mamishev Alexander

A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need...
Fumy Walter. Handbook of eID Security. Concepts, Practical Experiences, Technologies

Handbook of eID Security. Concepts, Practical Experiences, Technologies

Fumy Walter

In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as...
Bichot Charles-Edmond. Graph Partitioning

Graph Partitioning

Bichot Charles-Edmond

Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly...

Оставайтесь на связи

Будьте в курсе новостей о выходящих книгах, подпишитесь на нашу еженедельную рассылку:
© 2011-2026. Your Lib. All Rights Reserved.