Все книги жанра зарубежная компьютерная литература - Страница 39
Фильтровать по
Язык
Источник
Тип
Возрастные ограничения
Digital Transformation
Digital Transformation
The main aim of this book is to offer companies a simple and practical method to assess their maturi...
Recommender Systems
Recommender Systems
Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendati...
Information Evaluation
Information Evaluation
During the reception of a piece of information, we are never passive. Depending on its origin and co...
Information and Knowledge System
Information and Knowledge System
The purpose of this book is to question the relationships involved in decision making and the system...
Breaking Teleprinter Ciphers at Bletchley Park
Breaking Teleprinter Ciphers at Bletchley Park
This book is an edition of the General Report on Tunny with commentary that clarifies the often diff...
Information-Centric Networks
Information-Centric Networks
Since its inception, the Internet has evolved from a textual information system towards a multimedia...
Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide
Alcatel-Lucent Service Routing Architect (SRA) Self-Study Guide
A comprehensive resource for professionals preparing for Alcatel-Lucent Service Routing Architect (S...
Information Systems for Knowledge Management
Information Systems for Knowledge Management
More and more organizations are becoming aware of the importance of tacit and explicit knowledge own...
Brain-Computer Interfaces 2
Brain-Computer Interfaces 2
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messa...
Supply Chain Management and its Applications in Computer Science
Supply Chain Management and its Applications in Computer Science
Supply chain management is a key topic for a large variety of strategic decision problems. It is ess...
Vehicular Ad Hoc Network Security and Privacy
Vehicular Ad Hoc Network Security and Privacy
This book is a complete, single information source of techniques for complex security and privacy is...
Designing Interactive Hypermedia Systems
Designing Interactive Hypermedia Systems
This book aims at exploring and illustrating the different ways in which hypermedia systems and tool...
Collective Intelligence and Digital Archives
Collective Intelligence and Digital Archives
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the p...
Secure Connected Objects
Secure Connected Objects
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily opera...
Collective Intelligence Development in Business
Collective Intelligence Development in Business
This book analyses the development of Collective Intelligence by a better knowledge of the diversity...
Asymmetric Alliances and Information Systems
Asymmetric Alliances and Information Systems
This book explores the impact of information systems on the management of North–South asymmetric str...
The Antivirus Hacker's Handbook
The Antivirus Hacker's Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook gui...
Big-Data Analytics for Cloud, IoT and Cognitive Computing
Big-Data Analytics for Cloud, IoT and Cognitive Computing
The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT p...
Security in Fixed and Wireless Networks
Security in Fixed and Wireless Networks
Introduces aspects on security threats and their countermeasures in both fixed and wireless networks...
Graph-related Optimization and Decision Support Systems
Graph-related Optimization and Decision Support Systems
Constrained optimization is a challenging branch of operations research that aims to create a model...
Data Mining and Machine Learning in Building Energy Analysis
Data Mining and Machine Learning in Building Energy Analysis
Focusing on up-to-date artificial intelligence models to solve building energy problems, Artificial...
Prospective Ergonomics
Prospective Ergonomics
This book argues for a prospective turn in ergonomics to challenge the established fields of strateg...
The Uncertain Digital Revolution
The Uncertain Digital Revolution
Digital information and communication technologies can be seen as a threat to privacy, a step forwar...
Organizational Design for Knowledge Management
Organizational Design for Knowledge Management
Information and communication technologies have increased their share of services in contemporary ec...
Memory and Action Selection in Human-Machine Interaction
Memory and Action Selection in Human-Machine Interaction
The first goal of this book is to extend Two Minds originating from behavioral economics to the doma...
Cybersecurity Law
Cybersecurity Law
A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawy...
WHOIS Running the Internet
WHOIS Running the Internet
Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in...
Bioinformatics in Aquaculture
Bioinformatics in Aquaculture
Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic a...
Collaborative Annotation for Reliable Natural Language Processing
Collaborative Annotation for Reliable Natural Language Processing
This book presents a unique opportunity for constructing a consistent image of collaborative manual...
Security Management of Next Generation Telecommunications Networks and...
Security Management of Next Generation Telecommunications Networks and Services
This book will cover network management security issues and currently available security mechanisms...
The Image-Interface
The Image-Interface
Digital practices are shaped by graphical representations that appear on the computer screen, which...
Content Delivery Networks
Content Delivery Networks
The definitive guide to developing robust content delivery networks This book examines the real-worl...
Threat Modeling
Threat Modeling
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secret...
Network Attacks and Exploitation
Network Attacks and Exploitation
Incorporate offense and defense for a more effective network security strategy Network Attacks and E...
Advanced Internet Protocols, Services, and Applications
Advanced Internet Protocols, Services, and Applications
Today, the internet and computer networking are essential parts of business, learning, and personal...
Stories that Move Mountains
Stories that Move Mountains
Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audi...
Electronic Health Record
Electronic Health Record
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery...
Cloud Computing
Cloud Computing
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies...
Computing Networks
Computing Networks
“Computing Networks” explores the core of the new distributed computing infrastructures we are using...
Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementatio...
Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separ...