bannerbannerbanner

Зарубежная компьютерная литература

Все поджанры
Discovering Knowledge in Data. An Introduction to Data Mining
ОтложитьЧитал
000
добавлено 2018-04-13 05:28:42
The field of data mining lies at the confluence of predictive analytics, statistical analysis, and business intelligence...
Energy Security. An Interdisciplinary Approach
ОтложитьЧитал
000
добавлено 2018-06-10 03:09:08
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and C...
Multimedia Information Extraction. Advances in Video, Audio, and Imagery Analysis for Search, Data Mining, Surveillance and Authoring
ОтложитьЧитал
000
добавлено 2018-06-10 01:42:56
The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., ...
Reversible Computing. Fundamentals, Quantum Computing, and Applications
ОтложитьЧитал
000
добавлено 2018-04-11 02:55:09
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics th...
Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists
ОтложитьЧитал
000
добавлено 2018-06-09 13:38:04
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of sci...
Where Code and Content Meet. Design Patterns for Web Content Management and Delivery, Personalisation and User Participation
ОтложитьЧитал
000
добавлено 2018-06-08 19:29:24
A practical go-to reference for Web developers programming custom software for Web sites Most advanced Web sites or Web ...
Adapting Configuration Management for Agile Teams. Balancing Sustainability and Speed
ОтложитьЧитал
000
добавлено 2018-06-08 22:26:31
Adapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with...
Assembly Language Programming. ARM Cortex-M3
ОтложитьЧитал
000
добавлено 2018-04-14 00:53:59
ARM designs the cores of microcontrollers which equip most “embedded systems” based on 32-bit processors. Cortex M3 is o...
Public Key Cryptography. Applications and Attacks
ОтложитьЧитал
000
добавлено 2018-04-10 15:07:19
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniq...
Complex-Valued Neural Networks. Advances and Applications
ОтложитьЧитал
000
добавлено 2018-04-13 20:29:27
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applicatio...
Oracle Database Performance and Scalability. A Quantitative Approach
ОтложитьЧитал
000
добавлено 2018-06-09 19:21:11
The innovative performance and scalability features with each newer edition of the Oracle database system can present ch...
Привет, жизнь!
ОтложитьЧитал
000
добавлено 2018-03-10 08:10:33
Маркус Батлер – известный влогер, его позитивные видеоролики на YouTube собрали более 388 млн просмотров! В 2013 году Th...
Angular для профессионалов (pdf+epub)
ОтложитьЧитал
000
добавлено 2018-03-26 10:00:43
Выжмите из Angular – ведущего фреймворка для динамических приложений JavaScript – всё. Адам Фримен начинает с описания M...
Профессиональная разработка сайтов на Drupal 7
ОтложитьЧитал
000
добавлено 2018-03-26 09:56:31
/ Для профессионалов (Питер)
Эта книга представляет собой наиболее полное руководство по CMS Drupal 7, подготовленное силами сообщества Drupal. Она о...
Sony CLIÉ For Dummies
ОтложитьЧитал
000
добавлено 2018-02-06 03:21:56
Shows users how to make the most of Sony's popular Palm OS PDA, the CLIE Sony holds the second largest share of the U.S....
Custom CGI Scripting with Perl
ОтложитьЧитал
000
добавлено 2018-02-06 13:52:12
The only one-stop resource for Web developers and programmers This book is an indispensable resource for Web developers ...
Apple TV For Dummies
ОтложитьЧитал
000
добавлено 2018-02-09 12:01:34
Watch your iTunes downloads on a television screen with help from Apple TV For Dummies. This comprehensive guide offers ...
The Mac OS X Command Line. Unix Under the Hood
ОтложитьЧитал
000
добавлено 2018-02-21 07:10:20
The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that a...
Network Security Foundations. Technology Fundamentals for IT Success
ОтложитьЧитал
000
добавлено 2018-02-05 06:08:43
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out neede...
Reversing. Secrets of Reverse Engineering
ОтложитьЧитал
000
добавлено 2018-02-21 00:37:50
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly langu...
AutoCAD. Secrets Every User Should Know
ОтложитьЧитал
000
добавлено 2018-02-20 14:32:50
"I've been using AutoCAD for 22 years and have written a hundred books on the subject. I reviewed many CAD books back in...
Unauthorised Access. Physical Penetration Testing For IT Security Teams
ОтложитьЧитал
000
добавлено 2018-02-19 17:17:26
The first guide to planning and performing a physical penetration test on your computer's security Most IT security team...
Java Enterprise Design Patterns. Patterns in Java
ОтложитьЧитал
000
добавлено 2018-02-20 23:26:36
A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications T...
Architecting Enterprise Solutions. Patterns for High-Capability Internet-based Systems
ОтложитьЧитал
000
добавлено 2018-02-21 01:15:17
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and fl...
Network Services Investment Guide. Maximizing ROI in Uncertain Times
ОтложитьЧитал
000
добавлено 2018-02-20 12:58:21
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on invest...
Web 2.0 Heroes. Interviews with 20 Web 2.0 Influencers
ОтложитьЧитал
000
добавлено 2018-02-21 04:49:40
Web 2.0 may be an elusive concept, but one thing is certain: using the Web as merely a means of retrieving and displayin...
Hack Attacks Testing. How to Conduct Your Own Security Audit
ОтложитьЧитал
000
добавлено 2018-02-19 19:26:30
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach ...
Malicious Cryptography. Exposing Cryptovirology
ОтложитьЧитал
000
добавлено 2018-02-19 12:41:46
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password th...
UNIX Filesystems. Evolution, Design, and Implementation
ОтложитьЧитал
000
добавлено 2018-02-20 02:48:50
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies...
Effective GUI Testing Automation. Developing an Automated GUI Testing Tool
ОтложитьЧитал
000
добавлено 2018-02-19 23:17:39
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusti...
Linux Security. Craig Hunt Linux Library
ОтложитьЧитал
000
добавлено 2018-02-20 08:20:02
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most comple...
Service Providers. ASPs, ISPs, MSPs, and WSPs
ОтложитьЧитал
000
добавлено 2018-02-05 06:53:22
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe...
Technology Scorecards. Aligning IT Investments with Business Performance
ОтложитьЧитал
000
добавлено 2018-02-05 02:27:33
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com ...
Managing Open Source Projects. A Wiley Tech Brief
ОтложитьЧитал
000
добавлено 2018-02-04 18:07:30
The only guide to managing and integrating the open source model With the phenomenal success of Linux, companies are tak...
Building B2B Applications with XML. A Resource Guide
ОтложитьЧитал
000
добавлено 2018-02-05 05:16:22
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2...
Hack Attacks Revealed. A Complete Reference with Custom Security Hacking Toolkit
ОтложитьЧитал
000
добавлено 2018-02-04 20:06:40
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and ot...
BSD UNIX Toolbox. 1000+ Commands for FreeBSD, OpenBSD and NetBSD
ОтложитьЧитал
000
добавлено 2018-02-05 15:28:51
Learn how to use BSD UNIX systems from the command line with BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD and N...
Java Foundations
ОтложитьЧитал
000
добавлено 2018-02-05 12:47:25
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out neede...
Beginning SQL
ОтложитьЧитал
000
добавлено 2018-02-06 02:36:23
Taking readers through the basics of the language, right up to some more advanced topics, this book is a practical, hand...
Beginning Algorithms
ОтложитьЧитал
000
добавлено 2018-02-05 22:50:12
Beginning Algorithms A good understanding of algorithms, and the knowledge of when to apply them, is crucial to producin...
Показывать по
Рейтинг@Mail.ru