TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Зарубежная компьютерная литература

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
Ford Explorer c 1995 по 2001 год, цветные электросхемы в электронном виде (на английском языке)
Ford Explorer c 1995 по 2001 год, цветные электросхемы в электронном виде (на английском языке)
 
 
 Зарубежная компьютерная литература
    Наименование 
 Vehicular Ad Hoc Network Security and Privacy
261981
 Vehicular Ad Hoc Network Security and Privacy

 Автор: Xiaodong Lin

  This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardiza
...
 Service Quality of Cloud-Based Applications
261908
 Service Quality of Cloud-Based Applications

 Автор: Eric Bauer

  This book explains why applications running on cloud might not deliver the same service reliability, availability, latency and overall quality to end users as they do when the applications are running on traditional (non-virtualized, non-cloud) configurations, and explains what can be done to mitigate that risk.
...
 Designing Interactive Hypermedia Systems
261862
 Designing Interactive Hypermedia Systems

 Автор: Группа авторов

  This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social and technical complexities confronted by researchers in social, communication, humanities, art and design.
...


 Collective Intelligence and Digital Archives
261861
 Collective Intelligence and Digital Archives

 Автор: Группа авторов

  The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present and analyze concrete examples of collective intelligence at the service of digital archives.
...
 Crowdsourcing
261776
 Crowdsourcing

 Автор: Jean-Fabrice Lebraty

  Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new business opportunities. Chapter 1 is based on four examples: the online-banking sector, an informative television channel, the postal sector and the higher education sector. It shows that in the current co
...
 Secure Connected Objects
261736
 Secure Connected Objects

 Автор: Dominique Paret

  In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, including the many approaches (technical, security,
...
 Collective Intelligence Development in Business
261709
 Collective Intelligence Development in Business

 Автор: Herve Suzanne

  This book analyses the development of Collective Intelligence by a better knowledge of the diversity of the temperaments and behavioural and relational processes. The purpose is to help the reader become a better Collective Intelligence Leader, who will be able to capitalize on the specificities and the differences of the individuals present in its collective, and transform these differences into complementarities, which are a source of wealth.
...
 Asymmetric Alliances and Information Systems
261669
 Asymmetric Alliances and Information Systems

 Автор: Karim Said

  This book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth case studies which analyze different types of partnerships. Positioned at the heart of the value creation process, the choice of information system seems to be becoming a strategic issue which should be centered not only on the organizational decisions related to the type of alliance but also the manag
...
 The Antivirus Hacker's Handbook
261661
 The Antivirus Hacker's Handbook

 Автор: Elias Bachaalany

  Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse en
...
Показано 181 - 189 (всего 4594 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
21 22 23 24 25 26 27 28 29 30
Вход 
Если Вы забыли пароль, щелкните здесь





Вы новый клиент?
Зарегистрируйтесь
 
Отзывы 
Пейзаж в искусстве
Пожалуста проверте скачивание книг я питалса скачать любую з ..
3 из 5 звёзд!
 Информация 
Свяжитесь с нами
Как скачать и чем читать
  Quiero dinero © 2007