-
Ilmiy axborot faoliyati. Informatika,
-
-
Kulrang shlyapali xakerlik II jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Kulrang shlyapali xakerlik I jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
The Security Intelligence Handbook.Third Edition
Jeff May Cover, Lucas Clauser, Christopher Ahlberg,Ilmiy axborot faoliyati. Informatika,
-
Kompyuter muhandisligi asoslari
N.K. Tivari, D.K. Svami.,Kitobda dasturiy ta'minot turlari, MS Office, dasturlash asoslari, ma'lumotlar tuzilmalari va obyektga yo'naltirilgan dasturlash tushunchalari yetarli tafsilotlar bilan yoritilgan. Shu bilan birga kitobda kompyuterlarning tarixiy rivojlanishi, internetga asoslangan rivojlanish va bulutli hisoblash haqida ham so'z boradi.
-
Kosmik texnologiya
Ignasio Chechil,Mazkur xorijiy o'quv adabiyoti professor-o'qituvchilar, doktorantlar, magistrantlar va talaba-larning o'quv va ilmiy faoliyatida foydalanish uchun mo'ljallangan. Shuningdek, ilmiy izlanishlar olib borayotgan mustaqil tadqiqotchilar va keng ilmiy jamoatchilik uchun tavsiya qilinadi.
-
Kulrang shlyapali xakerlik II jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,"Kulrang shlyapali xakerlik" (Axloqiy xakerlik qo'llanmasi) kitobida axloqiy xakerlik nima ekanligi, dasturlashning asosiy ko'nikmalari, muhandislik vosita lari haqida so'z boradi. Kitob mutaxassislar, ushbu soha bo'yicha tahsil olayotgan talabalar va axloqiy xakerlikka qiziqqanlar uchun mo'ljallangan.
-
Kompyuter muhandisligi asoslari
N.K. Tivari, D.K. Svami,Kitobda dasturiy ta'minot turlari, MS Office, dasturlash asoslari, ma'lumotlar tuzilmalari va obyektga yo'naltirilgan dasturlash tushunchalari yetarli tafsilotlar bilan yoritilgan. Shu bilan birga kitobda kompyuterlarning tarixiy rivojlanishi, internetga asoslangan rivojlanish va bulutli hisoblash haqida ham so'z boradi. Mazkur xorijiy o'quv adabiyoti professor-o'qituvchilar, doktorantlar, magistrantlar va talabalarning o'quv va ilmiy faoliyatida foydalanish uchun mo'ljallangan. Shuningdek, ilmiy izlanishlar olib borayotgan mustaqil tadqiqotchilar va keng ilmiy jamoatchilik uchun tavsiya qilinadi.
-
Kulrang shlyapali xakerlik I jild
Allen Xarper, Rayan Lin, Stiven Sims, Maykl Baukom, Daniel Fernandez, Uaskar Texeda, Mozes Frost,"Kulrang shlyapali xakerlik" (Axloqiy xakerlik qo'llanmasi) kitobida axloqiy xakerlik nima ekanligi, dasturlashning asosiy ko'nikmalari, muhandislik vosita lari haqida so'z boradi. Kitob mutaxassislar, ushbu soha bo'yicha tahsil olayotgan talabalar va axloqiy xakerlikka qiziqqanlar uchun mo'ljallangan.
-
Effective Windows 95
Fritz J. Erickson,We wrote the Effective Series because we wanted a computer application textbook help us teach. At the time, most computer applications texts were written like cookbooks.
-
Data structures and algorithms using C#
Michael Mcmillan,C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing tests rather than Big O notation to analyze the efficiency of an approach. Coverage includes array and ArrayLists, linked lists, hash tables, dictionaries, trees, graphs, and sorting and searching algorithms, as well as more advanced algorithms such as probabilistic algorithms and dynamic programming. This is the perfect resource for C# professionals and students alike.
-
Bodendenkmalpflege in Mecklenburg
Ewald Schuld,Das Buch „Bodendenkmalpflege in Mecklenburg“ von Ewald Schuldt beschäftigt sich mit dem Schutz, der Erforschung und der Pflege archäologischer Denkmäler im Gebiet Mecklenburg. Der Autor beschreibt die Bedeutung von Bodendenkmälern als wichtige Quellen für die Geschichte und Kultur der Region. Im Mittelpunkt stehen Methoden der archäologischen Untersuchung, Dokumentation und Erhaltung. Außerdem wird die Zusammenarbeit zwischen Wissenschaftlern, Behörden und der Öffentlichkeit hervorgehoben.
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Издание представляет собой введение и справочное руководство по jQuery — мощной платформе для разработки веб-приложений. одробно описывается, как выполнять обход документов HTML, обрабатывать события, добавлять поддержку технологии Ajax в свои веб-страницы, воспроизводить анимацию и визуальные эффекты. Уникальные "лабораторные страницы" помогут закрепить изучение каждой новой концепции на практических примерах. Рассмотрены вопросы взаимодействия jQuery с другими инструментами и платформами и методы создания модулей расширения для этой библиотеки.
-
Mastering Malware Analysis
Alexey Kleymenov, Amr Thabet,Ahmed Neil is a well-known thought leader in the cybersecurity domain whose work focuses on information security, threat hunting, threat intelligence, malware analysis, and digital forensics. He also has a passion for academic research in the field of cybersecurity. He holds an MSc in computer forensics and is currently working at IBM as a cybersecurity engineer (operations).
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Modern technologists are masters at the art of searching Google for answers. If another system administrator has already encountered (and possibly solved) a problem, chances are you can find their write-up on the Internet. We applaud and encourage this open sharing of ideas and solutions.
-
Cybersecurity-Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya,All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.
-
IT Governance
Alan Calder, Steve Watkins,Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned addresses:
-
The Cyber Security Body of Knowledge
Awais Rashid,We are pleased to share CyBOK Version 1.1.0 with you. This version has added two new Knowledge Areas to CyBOK: Applied Cryptography and Formal Methods for Security. It also includes a major revision to Network Security, a minor revision to Risk Management & Governance and a host of small typographical xes. We have also added an extensive index of terms as a lookup mechanism.
-
Cybersecurity handbook
As information and communication technologies create a world of everincreasing complexity in interconnected systems and devices, the public debate on cybersecurity and privacy issues is constantly at the forefront, highlighting the need to strengthen the protection and resilience of these systems from the constantly evolving threats of modern cyberspace.
-
CYBERSECURITY
Charles J . Brooks, Christopher Grow, Philip Craig, Donald Short,As always, I want to thank the staff at ETG/Marcraft for making it easy to turn out a good product. In particular, thanks to Cathy Boulay and Luke Johns from the Product Development department for their excellent work in getting the text and graphics ready to go and looking good. Many thanks as well to Jeff Riley, whom I’ve known and worked with in the book production business for many years. Thanks for putting together another great project.
-
Cuber security essentials
James Graham, Richard Howard, Ryan Olson,This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
-
Computer security
William Stallings, Lawrie Brown,In the four and a half years since the first edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field.
-
The Security Intelligence Handbook.Third Edition
Jeff May Cover, Lucas Clauser, Christopher Ahlberg,Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, without the prior written permission of the publisher.