TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Зарубежная компьютерная литература

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
Mitsubishi V4AW4 / V5MT1, руководство по ремонту коробки передач в электронном виде (на английском языке)
Mitsubishi V4AW4 / V5MT1, руководство по ремонту коробки передач в электронном виде (на английском языке)
 
 
 Зарубежная компьютерная литература
    Наименование 
 Content Delivery Networks
259911
 Content Delivery Networks

 Автор: Dom Robinson

  The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and to ensure high-quality content delivery that fully satisfies operators’ and consumers' commercial objectives. It is informed by the author’s two decades of experience building and delivering large, mission
...
 Cyber-Risk Informatics
259872
 Cyber-Risk Informatics

 Автор: Mehmet Sahinoglu

  This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to ad
...
 Threat Modeling
259856
 Threat Modeling

 Автор: Adam Shostack

  The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security int
...


 Artificial Immune System
259804
 Artificial Immune System

 Автор: Ying Tan

  This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing
...
 Network Attacks and Exploitation
259742
 Network Attacks and Exploitation

 Автор: Matthew Monte

  Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual
...
 Interactions on Digital Tablets in the Context of 3D Geometry Learning
259558
 Interactions on Digital Tablets in the Context of 3D Geometry Learning

 Автор: David Bertolo

  Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of such applications. Throughout this book, the author focuses on allowing young students to manipulate, observe and modify 3D scenes using new technologies brought about by digital tablets. Through a u
...
 The Art of War in the Network Age
259532
 The Art of War in the Network Age

 Автор: Joseph Henrotin

  Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to
...
 The Network Security Test Lab
259474
 The Network Security Test Lab

 Автор: Michael Gregg

  The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside th
...
 Android Hacker's Handbook
258942
 Android Hacker's Handbook

 Автор: Zach Lanier

  The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the And
...
Показано 136 - 144 (всего 4594 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
11 12 13 14 15 16 17 18 19 20
Отзывы 
Транзисторный радиоприемник «Минск-62»
Классно, когда можно найти такие старые книги!!! там все нап ..
5 из 5 звёзд!
 Рекомендуем
Секреты уличных знакомств
Секреты уличных знакомств
 Информация 
Свяжитесь с нами
Как скачать и чем читать
 
  Quiero dinero © 2007