-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
-
Kulrang shlyapali xakerlik II jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Kulrang shlyapali xakerlik I jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
-
-
Ilmiy axborot faoliyati. Informatika,
-
Электрон кутубхона тармоқларида илмий-таълимий ахборотлар яратиш ва улардан фойдаланиш технологиялари
М.А. Раҳматуллаев,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Ilmiy axborot faoliyati. Informatika,
-
Ma'lumotlar kommunikatsiyalari va tarmoq texnologiyalari II-jild
Xan Ligang,Darslik kompyuter tarmoqlarini o'matish maqsadida Huawei tarmoq qurilmalaridan va kompyuter tarmoqlari nazariyalari uchun tajribalar hamda holatlarni loyihalashtirish yo'lidagi o'quv muhitini yaratishda virtual mashinalardan foydalanadi. U kompyuter ma'lumotlari aloqasi nazariyalari bo'yicha chuqur bilimga ega va tashkilot tarmoqlarini loyihalash hamda sozlash uchun Huawei routerlari, kalitlari, shuningdek, simli va simsiz qurilmalardan foydalanishi mumkin bo'lgan tarmoq muhandislarini tayyorlashda muhim manba hisoblanadi.
-
Ma'lumotlar kommunikatsiyalari va tarmoq texnologiyalari I-jild
Xan Ligang,Darslik kompyuter tarmoqlarini o'matish maqsadida Huawei tarmoq qurilmalaridan va kompyuter tarmoqlari nazariyalari uchun tajribalar hamda holatlarni loyihalashtirish yo'lidagi o'quv muhitini yaratishda virtual mashinalardan foydalanadi. U kompyuter ma'lumotlari aloqasi nazariyalari bo'yicha chuqur bilimga ega va tashkilot tarmoqlarini loyihalash hamda sozlash uchun Huawei routerlari, kalitlari, shuningdek, simli va simsiz qurilmalardan foydalanishi mumkin bo'lgan tarmoq muhandislarini tayyorlashda muhim manba hisoblanadi.
-
Kosmik texnologiya
Ignasio Chechil,Mazkur xorijiy o'quv adabiyoti professor-o'qituvchilar, doktorantlar, magistrantlar va talaba-larning o'quv va ilmiy faoliyatida foydalanish uchun mo'ljallangan. Shuningdek, ilmiy izlanishlar olib borayotgan mustaqil tadqiqotchilar va keng ilmiy jamoatchilik uchun tavsiya qilinadi.
-
Kulrang shlyapali xakerlik II jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,"Kulrang shlyapali xakerlik" (Axloqiy xakerlik qo'llanmasi) kitobida axloqiy xakerlik nima ekanligi, dasturlashning asosiy ko'nikmalari, muhandislik vosita lari haqida so'z boradi. Kitob mutaxassislar, ushbu soha bo'yicha tahsil olayotgan talabalar va axloqiy xakerlikka qiziqqanlar uchun mo'ljallangan.
-
Kompyuter muhandisligi asoslari
N.K. Tivari, D.K. Svami,Kitobda dasturiy ta'minot turlari, MS Office, dasturlash asoslari, ma'lumotlar tuzilmalari va obyektga yo'naltirilgan dasturlash tushunchalari yetarli tafsilotlar bilan yoritilgan. Shu bilan birga kitobda kompyuterlarning tarixiy rivojlanishi, internetga asoslangan rivojlanish va bulutli hisoblash haqida ham so'z boradi. Mazkur xorijiy o'quv adabiyoti professor-o'qituvchilar, doktorantlar, magistrantlar va talabalarning o'quv va ilmiy faoliyatida foydalanish uchun mo'ljallangan. Shuningdek, ilmiy izlanishlar olib borayotgan mustaqil tadqiqotchilar va keng ilmiy jamoatchilik uchun tavsiya qilinadi.
-
Kulrang shlyapali xakerlik I jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,"Kulrang shlyapali xakerlik" (Axloqiy xakerlik qo'llanmasi) kitobida axloqiy xakerlik nima ekanligi, dasturlashning asosiy ko'nikmalari, muhandislik vosita lari haqida so'z boradi. Kitob mutaxassislar, ushbu soha bo'yicha tahsil olayotgan talabalar va axloqiy xakerlikka qiziqqanlar uchun mo'ljallangan.
-
Банки данных
Григорьев Ю. А., Ревунков Г. И.,Приведены основные концепции построения банков данных. В первой части описаны методы построения локальных банков данных; основы инфологического подхода к проектированию информационных систем, методика информационного моделирования и построения моделей данных и знаний; иерархическая, сетевая, реляционная модели данных, семантические сети, фреймовые модели, системы продукций, логические модели, приемы проектирования локальных банков данных. Во второй части рассмотрены распределенные банки данных, архитектура распределенных систем обработки данных, задачи обеспечения функционирования распределенной базы данных, содержимое которых располагается в нескольких узлах информационной сети, модели доступа к данным.
-
Разработка компьютерных учебников и обучающих систем
Башмаков А.И., Башмаков И.А.,Излагается методология разработки компьютерных учебников и обу- чающих систем. Основное внимание уделяется стадии концептуального проектирования, на которой формируется облик продукта, определя- ется его содержательная направленность, специфицируются основные функции и важнейшие характеристики, вырабатываются принципиальные дидактические и программно-технические решения.
-
Effective Windows 95
Fritz J. Erickson,We wrote the Effective Series because we wanted a computer application textbook help us teach. At the time, most computer applications texts were written like cookbooks.
-
Ettective Word 7 0
Fritz J.Erickson,The aim of this book is to arouse curiosity about English words and about the nature of language in general, especially among students who are not intending to specialise in linguistics. The book covers a wide range of topics, including the structure of words, the meaning of words, how their spelling relates to pronunciation, how new words are manufactured or imported from other languages, and how the meaning of words changes with the passage of time. It also investigates how the mind deals with words by highlighting the amazing intellectual feat performed routinely when the right word is retrieved from the mental dictionary during conversation. Words of all sorts are examined—from great poetry, nonsense verse and journalism to advertising. It is demonstrated that in their very different ways they are all worthy of serious study.
-
Data structures and algorithms using C#
Michael Mcmillan,C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing tests rather than Big O notation to analyze the efficiency of an approach. Coverage includes array and ArrayLists, linked lists, hash tables, dictionaries, trees, graphs, and sorting and searching algorithms, as well as more advanced algorithms such as probabilistic algorithms and dynamic programming. This is the perfect resource for C# professionals and students alike.
-
Электрон кутубхона тармоқларида илмий-таълимий ахборотлар яратиш ва улардан фойдаланиш технологиялари
М.А. Раҳматуллаев,Электрон кутубхона тармоқларида илмий-таълимий ахборотлар яратиш ва улардан фойдаланиш технологиялари ёритилган.Электрон илмий-таълимий ресурслар ва электрон кутубхона яратиш технологиялари буйича хар йили утказиладиган семинарлар тупламининг навбатдаги нашрига шу номдаги материаллар киритилган.
-
Bodendenkmalpflege in Mecklenburg
Ewald Schuld,Das Buch „Bodendenkmalpflege in Mecklenburg“ von Ewald Schuldt beschäftigt sich mit dem Schutz, der Erforschung und der Pflege archäologischer Denkmäler im Gebiet Mecklenburg. Der Autor beschreibt die Bedeutung von Bodendenkmälern als wichtige Quellen für die Geschichte und Kultur der Region. Im Mittelpunkt stehen Methoden der archäologischen Untersuchung, Dokumentation und Erhaltung. Außerdem wird die Zusammenarbeit zwischen Wissenschaftlern, Behörden und der Öffentlichkeit hervorgehoben.
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Издание представляет собой введение и справочное руководство по jQuery — мощной платформе для разработки веб-приложений. одробно описывается, как выполнять обход документов HTML, обрабатывать события, добавлять поддержку технологии Ajax в свои веб-страницы, воспроизводить анимацию и визуальные эффекты. Уникальные "лабораторные страницы" помогут закрепить изучение каждой новой концепции на практических примерах. Рассмотрены вопросы взаимодействия jQuery с другими инструментами и платформами и методы создания модулей расширения для этой библиотеки.
-
Mastering Malware Analysis
Alexey Kleymenov, Amr Thabet,Ahmed Neil is a well-known thought leader in the cybersecurity domain whose work focuses on information security, threat hunting, threat intelligence, malware analysis, and digital forensics. He also has a passion for academic research in the field of cybersecurity. He holds an MSc in computer forensics and is currently working at IBM as a cybersecurity engineer (operations).
-
Malware
Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis,This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
-
The Impact of Artificial Intelligence on the Future of Cybersecurity
Mariam Aldhamer,Artificial Intelligence (AI) is rapidly transforming various aspects of our lives, including cybersecurity. As the threat landscape becomes increasingly complex and sophisticated, traditional cybersecurity measures alone are no longer sufficient. AI presents a game-changing opportunity to enhance cybersecurity defenses and mitigate the risks posed by cyber-attacks.
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Modern technologists are masters at the art of searching Google for answers. If another system administrator has already encountered (and possibly solved) a problem, chances are you can find their write-up on the Internet. We applaud and encourage this open sharing of ideas and solutions.
-
Cybersecurity-Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya,All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.