Все книги жанра зарубежная компьютерная литература - Страница 39

Фильтровать по

Язык

Источник

Тип

Возрастные ограничения

Группировать серии
Найдено 2708 книг
Digital Transformation

Digital Transformation

Digital Transformation

0
0

The main aim of this book is to offer companies a simple and practical method to assess their maturi...

Recommender Systems

Recommender Systems

Recommender Systems

0
0

Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendati...

Information Evaluation

Information Evaluation

Information Evaluation

0
0

During the reception of a piece of information, we are never passive. Depending on its origin and co...

Information and Knowledge System

Information and Knowledge System

Information and Knowledge System

0
0

The purpose of this book is to question the relationships involved in decision making and the system...

Information-Centric Networks

Information-Centric Networks

Information-Centric Networks

0
0

Since its inception, the Internet has evolved from a textual information system towards a multimedia...

Brain-Computer Interfaces 2

Brain-Computer Interfaces 2

Brain-Computer Interfaces 2

0
0

Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messa...

Vehicular Ad Hoc Network Security and Privacy

Vehicular Ad Hoc Network Security and Privacy

Vehicular Ad Hoc Network Security and Privacy

0
0

This book is a complete, single information source of techniques for complex security and privacy is...

Designing Interactive Hypermedia Systems

Designing Interactive Hypermedia Systems

Designing Interactive Hypermedia Systems

0
0

This book aims at exploring and illustrating the different ways in which hypermedia systems and tool...

Secure Connected Objects

Secure Connected Objects

Secure Connected Objects

0
0

In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily opera...

Asymmetric Alliances and Information Systems

Asymmetric Alliances and Information Systems

Asymmetric Alliances and Information Systems

0
0

This book explores the impact of information systems on the management of North–South asymmetric str...

The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

0
0

Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook gui...

Security in Fixed and Wireless Networks

Security in Fixed and Wireless Networks

Security in Fixed and Wireless Networks

0
0

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks...

Prospective Ergonomics

Prospective Ergonomics

Prospective Ergonomics

0
0

This book argues for a prospective turn in ergonomics to challenge the established fields of strateg...

The Uncertain Digital Revolution

The Uncertain Digital Revolution

The Uncertain Digital Revolution

0
0

Digital information and communication technologies can be seen as a threat to privacy, a step forwar...

Cybersecurity Law

Cybersecurity Law

Cybersecurity Law

0
0

A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawy...

WHOIS Running the Internet

WHOIS Running the Internet

WHOIS Running the Internet

0
0

Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in...

Bioinformatics in Aquaculture

Bioinformatics in Aquaculture

Bioinformatics in Aquaculture

0
0

Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic a...

The Image-Interface

The Image-Interface

The Image-Interface

0
0

Digital practices are shaped by graphical representations that appear on the computer screen, which...

Content Delivery Networks

Content Delivery Networks

Content Delivery Networks

0
0

The definitive guide to developing robust content delivery networks This book examines the real-worl...

Threat Modeling

Threat Modeling

Threat Modeling

0
0

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secret...

Network Attacks and Exploitation

Network Attacks and Exploitation

Network Attacks and Exploitation

0
0

Incorporate offense and defense for a more effective network security strategy Network Attacks and E...

Stories that Move Mountains

Stories that Move Mountains

Stories that Move Mountains

0
0

Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audi...

Electronic Health Record

Electronic Health Record

Electronic Health Record

0
0

Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery...

Cloud Computing

Cloud Computing

Cloud Computing

0
0

The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies...

Computing Networks

Computing Networks

Computing Networks

0
0

“Computing Networks” explores the core of the new distributed computing infrastructures we are using...

Этот сайт использует cookies для улучшения качества обслуживания. Мы используем cookies, чтобы обеспечить лучшее взаимодействие.