-
Umumtexnikaviy fanlar,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Umumtexnikaviy fanlar,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
-
Umumiy biologiya,
-
-
-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Distributed Network Systems from Concepts to Implementations
Weijia Jia, Ding-Zhu Du, Raghavendra C., Wanlei Zhou,Umumtexnikaviy fanlar, -
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
A Graduate Course in Applied Cryptography
Dan Boneh , Victor Shoup,This book is about exactly that: constructing practical cryptosystems for which we can argue security under plausible assumptions.
-
English for ecologists
A.S. Jumabayeva,Mazkur “English for ecologists” nomli o‘quv qo‘llanma Xorijiy (ingliz tili) til fani bo‘yicha 60520200 – Ekologiya va atrof-muhit muhofazasi (tabiat ekologiyasi) ta’lim yo‘nalishi talabalar uchun mo‘ljallangan. O‘quv qo‘llanma Xorijiy til fanining o‘quv dasturi bo‘yicha tuzilgan va fan mavzularini tizimli yoritib bergan. O‘quv qo‘llanmaning asosiy maqsadi talabalarning ingliz tilini samarali o‘rganishi hamda ekologiya sohasida qo‘llaniladigan ingliz tilidagi atamalar va matnlar bilan ishlash malakasi va muloqot shakllarini o‘rganishga yordam beradi.
-
Computer Security
William Stallings, Lawrie Brown,Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.
-
Operating System Concepts and Basic Linux Commands
Shubham Vihar,The opinions/ contents expressed in this book are solely of the authors and do not represent the opinions/ standings/ thoughts of Educreation or the Editors . The book is released by using the services of self-publishing house
-
Modern Operating Systems
Andrew S.Tanebaum, Herbert Bos,The fourth edition of this book differs from the third edition in numerous ways.There are large numbers of small changes everywhere to bring the material up todate as operating systems are not standing still.The chapter on Multimedia Operating Systems has been moved to the Web,primarily to make room for new material and keep the book from growing to a completely unmanageable size.
-
LINUX with Operating System Concepts
Richard Fox,This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
-
Bioinformatics and Functional Genomics
Jonathan Pevsner,The cover image is by Leonardo da Vinci, a study of a man in profile with studies of horse and riders (reproduced with kind permission of the Gallerie d’Accademia, Venice, Ms. 7r [236r], pen, black and red chalk). To the upper right a DNA molecule is shown (image courtesy of Wikimedia Commons) and a protein (human serum albumin, the most abundant protein in blood plasma, accession 1E7I, visualized with Cn3D software described in Chapter 13). Leonardo’s text reads: “From the eyebrow to the junction of the lip with the chin, and the angle of the jaw and the upper angle where the ear joins the temple will be a perfect square. And each side by itself is half the head. The hollow of the cheek bone occurs half way between the tip of the nose and the top of the jaw bone, which is the lower angle of the setting on of the ear, in the frame here represented. From the angle of the eye-socket to the ear is as far as the length of the ear, or the third of the face.” (Translation by Jean-Paul Richter, The Notebooks of Leonardo da Vinci, London, 1883.)
-
Applied Bioinformatics An Introduction
P.M. Selzer, R.J. Marhöfer, A. Rohwer,Though a relatively young discipline, bioinformatics is fi nding increasing importance in many life science disciplines, including biology, biochemistry, medicine, and chemistry. Since its beginnings in the late 1980s, the success of bioinformatics has been associated with rapid developments in computer science, not least in the relevant hardware and software. In addition, biotechnological advances such as those witnessed in the fi elds of genome sequencing, microarrays and proteomics have contributed enormously to the bioinformatics boom. Finally, the simultaneous breakthrough and success of the World-Wide Web has facilitated the worldwide distribution of and easy access to bioinformatics tools. Today, bioinformatics techniques such as the BLAST algorithm, pairwise and multiple sequence comparisons, queries of biological databases, and phylogenetic analyses have become familiar tools to the natural scientist. Many of the software products that were initially unintuitive and cryptic have matured into relatively simple and user-friendly products being easily accessible over the Internet. One no longer needs to be a computer scientist to profi ciently operate bioinformatics tools with respect to complex scientifi c questions. Nevertheless, what remains important is an understanding of fundamental biological principles together with a knowledge of the appropriate bioinformatics tools available and how to access them. Also, and not least, is the confi dence to apply these tools correctly to generate meaningful results.
-
Computer Security
William Stallings, Lawrie Brown,Since the third edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. To begin the process of revision, the third edition of this book was extensively reviewed by a number of professors who teach the subject and by professionals working in the field. The result is that in many places the narrative has been clarified and tightened, and illustrations have been improved.
-
Cloud Computing Technology
[],This work is subject to copyright. All commercial rights are reserved by the author(s), whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Regarding these commercial rights a non-exclusive license has been granted to the publisher.
-
Cloud Computing
Thomas Erl, Eric Barceló Monroy,This book is a solid and comprehensive overview of the cloud concepts and the real mechanics of how the cloud works. It does a nice job of not only explaining cloud function and architecture but the business impact. It’s a great foundation for creating a cloud roadmap.
-
Data Communications and Networking with TCP/IP Protocol Suite
Behrouz A. Forouzan,The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website does not indicate an endorsement by the authors or McGraw Hill LLC, and McGraw Hill LLC does not guarantee the accuracy of the information presented at these sites
-
Computer Networking. A Top-Down Approach. Seventh Edition
James F. Kurose,Today's Internet is arguably the largest engineered system ever created by -mankind, with hundreds of millions of connected computers, communication links, and switches; with billions of users who connect via laptops, tablets, and smartphones; and with an array of new Internet-connected “things” including game consoles, surveillance systems, watches, eye glasses, thermostats, body scales, and cars. Given that the Internet is so large and has so many diverse components and uses, is there any hope of understanding how it works? Are there guiding principles and structure that can provide a foundation for understanding such an amazingly large and
-
Data and Computer Communications
William Stallings,All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS
-
Advanced Research Methods for Applied Psychology
Paula Brough,The necessity for this book primarily arose from the long-term recognition that many post-graduates do not seem to be suitably equipped to consider the multiple nuances involved in conducting high quality psychological research. In addition, their available pathways to suitably educate themselves about research designs, research methods, data cleaning, statistical analyses, academic writing, and so on were multiple and somewhat convoluted. What was needed was a ‘one-stop shop’ discussing current research dilemmas to inform and assist them in their research training. An informed collection of current research methods and analyses issues providing a broad overview of the most relevant research topics for thesis students and other researchers in this field was considered to be of the most value, with clear directions also provided to explore more detailed discussions about each topic.
-
Computer Networks
Andrew S. Tanenbaum, David J. Wetherall,All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a licence permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS
-
Distributed Network Systems from Concepts to Implementations
Weijia Jia, Ding-Zhu Du, Raghavendra C., Wanlei Zhou,Both authors have taught the course of “Distributed Systems” for many years in the respective schools. During the teaching, we feel strongly that “Distributed systems” have evolved from traditional “LAN” based distributed systems towards “Internet based” systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of “distributed systems” with orientation to the requirement of the undergraduate level study for today’s distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.
-
Computer Organization and Design
David A. Patterson, John L. Hennessy,This race to innovate has led to unprecedented progress since the inception of electronic computing in the late 1940s. Had the transportation industry kept pace with the computer industry, for example, today we could travel from New York to London in a second for a penny.
-
Pluripotential Theory
Maciej Klimek,The subject ofthis monograph is a recently developed (non-linear) potential theory which is particularly suitable for multidimensional complex analysis. To provide a framework for the approach adopted in this book, we shall first make a few comments concerning convex and subharmonic functions. One of many characterizations of convex functions is the following. Let I C R be an open interval, and let v be a real-valued function defined on I. Then v is convex if and only if the set of points lying on and above the graph of v is convex; that is, any two points of the set
-
Data Communications and Networking
Behrouz A. Forouzan,As one of the fastest growing technologies in our culture today, data communications and networking presents a unique challenge for instructors. As both the number and types of students are increasing, it is essential to have a textbook that provides coverage of the latest advances, while presenting the material in a way that is accessible to students with little or no background in the field. Using a bottom-up approach, Data Communications and Networking presents this highly technical subject matter without relying on complex formulas by using a strong pedagogical approach supported by more than 700 figures. Now in its Fourth Edition, this textbook brings the beginning student right to the forefront of the latest advances in the field, while presenting the fundamentals in a clear, straightforward manner. Students will find better coverage, improved figures and better explanations on cutting-edge material. The "bottom-up" approach allows instructors to cover the material in one course, rather than having separate courses on data communications and networking.