Все книги жанра зарубежная компьютерная литература - Страница 12
Фильтровать по
Язык
Источник
Тип
Возрастные ограничения
Belief and Misbelief Asymmetry on the Internet
Belief and Misbelief Asymmetry on the Internet
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as ye...
Lean Computing for the Cloud
Lean Computing for the Cloud
Applies lean manufacturing principles across the cloud service delivery chain to enable application...
Medical Information Systems Ethics
Medical Information Systems Ethics
The exponential digitization of medical data has led to a transformation of the practice of medicine...
From Big Data to Smart Data
From Big Data to Smart Data
A pragmatic approach to Big Data by taking the reader on a journey between Big Data (what it is) and...
Information and Recommender Systems
Information and Recommender Systems
Information is an element of knowledge that can be stored, processed or transmitted. It is linked to...
Information Warfare
Information Warfare
Cyberspace is one of the major bases of the economic development of industrialized societies and dev...
The Official (ISC)2 Guide to the CCSP CBK
The Official (ISC)2 Guide to the CCSP CBK
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credenti...
Cyber-Assurance for the Internet of Things
Cyber-Assurance for the Internet of Things
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-a...
Decision-Making and the Information System
Decision-Making and the Information System
The purpose of this book is to question the relationships involved in decision making and the system...
Performance Evaluation by Simulation and Analysis with Applications to...
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
This book is devoted to the most used methodologies for performance evaluation: simulation using spe...
Versatile Routing and Services with BGP
Versatile Routing and Services with BGP
Design a robust BGP control plane within a secure, scalable network for smoother services A robust B...
Fiber Optics Installer (FOI) Certification Exam Guide
Fiber Optics Installer (FOI) Certification Exam Guide
Pass the FOI exam with a strong foundation in fiber optic technology Fiber Optics Installer (FOI) Ce...
E-mail and Behavioral Changes
E-mail and Behavioral Changes
This book is a study of the causes of spam, the behaviors associated to the generation of and the ex...
Competitive Intelligence and Decision Problems
Competitive Intelligence and Decision Problems
The development of a research, teaching, or application of competitive (economic) intelligence requi...
Knowledge Needs and Information Extraction
Knowledge Needs and Information Extraction
This book presents a theory of consciousness which is unique and sustainable in nature, based on phy...
Transformation of Collective Intelligences
Transformation of Collective Intelligences
There is a great transformation of the production of knowledge and intelligibility. The «digital fol...
Network Reliability
Network Reliability
In Engineering theory and applications, we think and operate in terms of logics and models with some...
Cybersecurity
Cybersecurity
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preve...
ERP and Information Systems
ERP and Information Systems
This research attempts to explore and identify eventual relationships between the evolution of ERP s...
Computing Fundamentals
Computing Fundamentals
Kick start your journey into computing and prepare for your IC3 certification With this essential co...
Linux Server Security
Linux Server Security
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: H...
Cyber-Risk Informatics
Cyber-Risk Informatics
This book provides a scientific modeling approach for conducting metrics-based quantitative risk ass...
Artificial Immune System
Artificial Immune System
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a nu...
Interactions on Digital Tablets in the Context of 3D Geometry Learning
Interactions on Digital Tablets in the Context of 3D Geometry Learning
Over the last few years, multi-touch mobile devices have become increasingly common. However, very f...
The Art of War in the Network Age
The Art of War in the Network Age
Previous studies have looked at the contribution of information technology and network theory to the...
The Network Security Test Lab
The Network Security Test Lab
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a...
Data Science and Big Data Analytics. Discovering, Analyzing, Visualizi...
Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data
Data Science and Big Data Analytics is about harnessing the power of data for new insights. The book...
Cyber Security Policy Guidebook
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security...
Biomolecular Networks
Biomolecular Networks
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances...
Микросервисы на платформе .NET (pdf+epub)
Микросервисы на платформе .NET (pdf+epub)
Создание микросервисов – удобная и надежная парадигма для программирования легких отказоустойчивых п...
CSS3 Foundations
CSS3 Foundations
Master innovative and eye-catching website design with the exciting new Treehouse Series of books Tu...
Digital Audiovisual Archives
Digital Audiovisual Archives
Today, huge quantities of digital audiovisual resources are already available – everywhere and at an...
Building the Internet of Things with IPv6 and MIPv6. The Evolving Worl...
Building the Internet of Things with IPv6 and MIPv6. The Evolving World of M2M Communications
If we had computers that knew everything there was to know about things—using data they gathered wit...
Information Storage and Management. Storing, Managing, and Protecting...
Information Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
The new edition of a bestseller, now revised and update throughout! This new edition of the unparall...
Enterprise Data Governance. Reference and Master Data Management Seman...
Enterprise Data Governance. Reference and Master Data Management Semantic Modeling
In an increasingly digital economy, mastering the quality of data is an increasingly vital yet still...
Data Mining and Statistics for Decision Making
Data Mining and Statistics for Decision Making
Data mining is the process of automatically searching large volumes of data for models and patterns...
Practical Database Programming With Visual C#.NET
Practical Database Programming With Visual C#.NET
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programm...
Static Analysis of Software. The Abstract Interpretation
Static Analysis of Software. The Abstract Interpretation
The existing literature currently available to students and researchers is very general, covering on...
Maschinen mit Bewusstsein. Wohin Führt die Künstliche Intelligenz?
Maschinen mit Bewusstsein. Wohin Führt die Künstliche Intelligenz?
Mochten Sie mit einem Roboter Handchen halten? Wie fuhlt sich das wohl an? Sind Bewusstsein und Emot...
Constraint Networks. Targeting Simplicity for Techniques and Algorithm...
Constraint Networks. Targeting Simplicity for Techniques and Algorithms
A major challenge in constraint programming is to develop efficient generic approaches to solve inst...