Зарубежная компьютерная литература
электронная книга
Год написания книги 2018
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Au…
электронная книга
Год написания книги 2018
What every IT manager and system administrator needs to know about the technology that drives the B2B marketplace The B2B marketplace is rapidly exploding–fast outpacing business-to-consumer e-co…
электронная книга
Год написания книги 2018
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the do…
электронная книга
Год написания книги 2018
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate thr…
электронная книга
Год написания книги 2018
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by …
электронная книга
Год написания книги 2018
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective al…
электронная книга
Год написания книги 2018
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the…
электронная книга
Год написания книги 2018
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning …
электронная книга
Год написания книги 2018
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the n…
электронная книга
Год написания книги 2018
The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, conci…
электронная книга
Год написания книги 2018
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and…
электронная книга
Год написания книги 2018
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and sy…
электронная книга
Год написания книги 2018
A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores the subject of design patterns, or patterns tha…
электронная книга
Год написания книги 2018
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwi…
электронная книга
Год написания книги 2018
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expec…
электронная книга
Год написания книги 2018
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expec…
электронная книга
Год написания книги 2018
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database program…
электронная книга
Год написания книги 2018
This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM …
электронная книга
Год написания книги 2018
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is …
электронная книга
Год написания книги 2018
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex m…


















