TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Зарубежная компьютерная литература

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
Engines Cummins L10, service e-manual
Engines Cummins L10, service e-manual
 
 
 Зарубежная компьютерная литература
    Наименование 
 Collaborative Annotation for Reliable Natural Language Processing
260116
 Collaborative Annotation for Reliable Natural Language Processing

 Автор: Karen Fort

  This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success of machine learning, which is now, for better or for worse, overwhelmingly dominant in the field, and secondly, the multiplication of evaluation campaigns or shared tasks. Both involve manually annotated
...
 Security Management of Next Generation Telecommunications Networks and Services
260018
 Security Management of Next Generation Telecommunications Networks and Services

 Автор: Stuart Jacobs

  This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security
...
 Transformation of Collective Intelligences
259982
 Transformation of Collective Intelligences

 Автор: Jean-Max Noyer

  There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern “performative science and performative society”. But one emerges and strengthens that has several names: transhumanism, post-human
...


 Network Reliability
259961
 Network Reliability

 Автор: Sanjay Kumar Chaturvedi

  In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The present text is aimed at providing modelling and analysis techniques for the evaluation of reliability measures (2-terminal, all-terminal, k-terminal reliability) for systems whose structure can be described in the form of a probabilistic graph. Among the several approaches of network reliability evaluat
...
 Cybersecurity
259959
 Cybersecurity

 Автор: Thomas J. Mowbray

  A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and a
...
 ERP and Information Systems
259945
 ERP and Information Systems

 Автор: Tarek Samara

  This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems and the information systems are guided by certain factors and, as a result, to understand, more in-depth, the factors affecting these relationships. More precisely, this analysis aims to study whether assig
...
 Computing Fundamentals
259938
 Computing Fundamentals

 Автор: Faithe Wempen

  Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft Office Master Instructor and author of more than 120 books, this complete guide to the basics has been tailored to provide comprehensive instruction on the full range of entry-level computing skills. It i
...
 Linux Server Security
259928
 Linux Server Security

 Автор: Chris Binnie

  Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past,
...
 The Image-Interface
259921
 The Image-Interface

 Автор: Everardo Reyes-Garcia

  Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the screen there is a series of layers that affect its visual properties. To discover such processes it is necessary to investigate software applications, graphical user interfaces, programmi
...
Показано 145 - 153 (всего 4594 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
11 12 13 14 15 16 17 18 19 20
Вход 
Если Вы забыли пароль, щелкните здесь





Вы новый клиент?
Зарегистрируйтесь
 
Отзывы 
Генетика и наследственные болезни собак и кошек
Огромное спасибо авторам! Особенно Наталье Николаевне, препо ..
5 из 5 звёзд!
 Информация 
Свяжитесь с нами
Как скачать и чем читать
  Quiero dinero © 2007