Рубрикатор

Главная >> Книги >> Зарубежная компьютерная литература

Зарубежная компьютерная литература

Build Your Skills with Hundreds of Helpful Ideas from Two AutoCAD Superstars Two AutoCAD experts distill years of combined experience into hundreds of the most useful AutoCAD tips and techniques you'll ever find. Fun, easy to read, and packed with information, this beautiful guide equips you with inside tricks on critical AutoCAD features and functions–all in fast, easy-to-digest nuggets....
"I've been using AutoCAD for 22 years and have written a hundred books on the subject. I reviewed many CAD books back in the days when book reviews were common in CAD publications; some were innovative, others were just sad. But for nearly a decade, it's been mostly silence on the book review front. Then earlier in the summer, a book arrived in the mail from Sybex: AutoCAD Secrets Every User...
"Omura's explanations are concise, his graphics are excellent, and his examples are practical." —CADalyst The Definitive CAD Resource Updated for 2005 Mastering AutoCAD 2005 and AutoCAD LT 2005 is a fully updated edition of Omura's enduring masterpiece. Once again, he delivers the most comprehensive and comprehensible coverage for AutoCAD and AutoCAD LT users including information on the...
Master 3D Studio VIZ Including All the New Features of Release 3 In Mastering 3D Studio VIZ 3, world-renowned AutoCAD expert George Omura teaches you every aspect of AutoDesk's powerful 3D design and modeling tool. Whether you're entirely new to VIZ or just want to get up to speed on the latest release, this book offers the explanations and clear, step-by-step instruction you need to put VIZ...
Mochten Sie mit einem Roboter Handchen halten? Wie fuhlt sich das wohl an? Sind Bewusstsein und Emotionen konstruierbar – oder bleiben sie ein allein menschliches Privileg? Schon im Jahr 2015 sind PCs ahnlich leistungsfahig wie das menschliche Gehirn. Das klingt zwar wie Science-Fiction, ist jedoch die gut begrundete Prognose von Wissenschaftlern, die sich mit Kunstlicher Intelligenz...
Starting with an updated description of Allen's calculus, the book proceeds with a description of the main qualitative calculi which have been developed over the last two decades. It describes the connection of complexity issues to geometric properties. Models of the formalisms are described using the algebraic notion of weak representations of the associated algebras. The book also includes a...
The only singular, all-encompassing textbook on state-of-the-art technical performance evaluation Fundamentals of Performance Evaluation of Computer and Telecommunication Systems uniquely presents all techniques of performance evaluation of computers systems, communication networks, and telecommunications in a balanced manner. Written by the renowned Professor Mohammad S. Obaidat and his...
Explains for the first time how «computing with words» can aid in making subjective judgments Lotfi Zadeh, the father of fuzzy logic, coined the phrase «computing with words» (CWW) to describe a methodology in which the objects of computation are words and propositions drawn from a natural language. Perceptual Computing explains how to implement CWW to aid in the important area of making...
Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly increased and big improvements have been made. This book brings together the knowledge accumulated during many years to extract both theoretical...
In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as for secure personal identification and access control in e-business. Further eID applications will be implemented in the healthcare sector. For some of...
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular networks in living organisms. With this development has come recognition of the fact that a complicated living organism cannot be fully understood by merely...
“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures’ communication systems. Cloud...
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global market-place of cloud computing services supporting scientific, industrial, business, and consumer applications. We expect the book to serve as a reference...
Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase «health informatics,» which deals with the use of IT for better healthcare services. Health informatics applications often involve maintaining the health records of individuals, in digital form, which is...
Learn how to use stories and visuals to make top–notch presentations It′s called CAST (Content, Audience, Story, & Tell) and it′s been a quiet success, until now. Developed over a twelve year period as a presentation method to help Enterprise Architects, it was adopted by Microsoft Enterprise Architecture teams and filtered from IT managers to Sales, and beyond to major organizations...
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security,...
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and...
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good...
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build...
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to critically analyze the contributions and challenges...
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of such applications. Throughout this book, the author focuses on allowing young students to manipulate, observe and modify 3D scenes using new...
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the...
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University,...
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific...
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader...
The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and to ensure high-quality content delivery that fully satisfies operators’ and consumers' commercial objectives. It is informed by the author’s two...
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the screen there is a series of layers that affect its visual properties. To discover such processes it is necessary to investigate...
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical...
Kick start your journey into computing and prepare for your IC3 certification With this essential course book you'll be sending e-mails, surfing the web and understanding the basics of computing in no time. Written by Faithe Wempen, a Microsoft Office Master Instructor and author of more than 120 books, this complete guide to the basics has been tailored to provide comprehensive instruction on...
This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems and the information systems are guided by certain factors and, as a result, to understand, more in-depth, the factors affecting these relationships. More...
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity...
In Engineering theory and applications, we think and operate in terms of logics and models with some acceptable and reasonable assumptions. The present text is aimed at providing modelling and analysis techniques for the evaluation of reliability measures (2-terminal, all-terminal, k-terminal reliability) for systems whose structure can be described in the form of a probabilistic graph. Among...
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern “performative science and performative society”. But one emerges...
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network...
This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success of machine learning, which is now, for better or for worse, overwhelmingly dominant in the field, and secondly, the multiplication of evaluation...
This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which draws upon various disciplines, the author presents a number of different theories, all of which have been abundantly studied by scientists from both a...
The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when interpreting results, either from the training of a specialist or in respect to a country or region. The authors of this book, members of an expert group supported by the...
Bioinformatics derives knowledge from computer analysis of biological data. In particular, genomic and transcriptomic datasets are processed, analysed and, whenever possible, associated with experimental results from various sources, to draw structural, organizational, and functional information relevant to biology. Research in bioinformatics includes method development for storage, retrieval,...
Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other...
This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book...
Наверх