-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
-
-
-
-
Tilshunoslik,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Faoliyat ayrim turlarining psixologiyasi. Tarmoq (amaliy) psixologiyasi,
-
-
-
Tilshunoslik,
-
-
Umumtexnikaviy fanlar,
-
-
The Security Intelligence Handbook.Third Edition
Jeff May Cover, Lucas Clauser, Christopher Ahlberg,Ilmiy axborot faoliyati. Informatika, -
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.
-
IT Governance
Alan Calder, Steve Watkins,Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned addresses:
-
The Cyber Security Body of Knowledge
Awais Rashid,We are pleased to share CyBOK Version 1.1.0 with you. This version has added two new Knowledge Areas to CyBOK: Applied Cryptography and Formal Methods for Security. It also includes a major revision to Network Security, a minor revision to Risk Management & Governance and a host of small typographical xes. We have also added an extensive index of terms as a lookup mechanism.
-
Cybersecurity handbook
As information and communication technologies create a world of everincreasing complexity in interconnected systems and devices, the public debate on cybersecurity and privacy issues is constantly at the forefront, highlighting the need to strengthen the protection and resilience of these systems from the constantly evolving threats of modern cyberspace.
-
PROFESSIONAL ENGLISH IN IT B2 – C1
O.M.Krasnenko, L.V.Kucheriava,The Professional English in IT textbook has been designed for the students completing their 4th year of undergraduate study in Intellectual and Information Systems, Cyber Security and Information Protection, Software Systems and Technologies, Applied Information Systems, Networking and Internet Technologies, Technology Management.
-
ENGLISH FOR ICT STUDENTS
Darija Pešut,The author acknowledges the following sources of copyright materials and is very grateful for the permissions granted: ComputerLanguage.com, Deutsche Welle, DZone, Encyclopedia Britannica, IBM Corporation, IGI Global Dictionary, Interaction Design Foundation, National Academies Press, Queensland Government, Totaljobs, Typesy, University Health Services at Princeton University, and Wiley – dummies.com. The author sincerely thanks Gjurgjica Mimica Bezjak for her reviewing and proofreading contributions, and Lamia Kulenović for her reviewing contribution, which improved the quality and clarity of this work.
-
English for IT Students
В. Г. Беседина,Пособие предназначено для расширенного изучения английского языка в сфере информационных технологий для студентов 2-го курса, владеющих грамматикой и имеющих базовый запас английских лексических единиц. Пособие состоит из 6 уроков. Каждый урок включает аутентичный текст по направлению, словарь с транскрипцией, вопросы для проверки понимания прочитанного и цикл упражнений на закрепление материала. Разработанные задания способствуют усвоению и запоминанию специальных терминов. Упражнения помогают развитию умений и навыков устной речи.
-
English for Informatics, Informatics Systems, and Informatics Engineering Students
Tira Nur Fitria,This book contains both orally and in writing in the fields of Information and Communication Technology (ICT). This textbook includes 20 chapters, each unit is equipped with four English skills (reading and writing, also speaking and listening) then followed by tasks at the end of each chapter.
-
CYBERSECURITY
Charles J . Brooks, Christopher Grow, Philip Craig, Donald Short,As always, I want to thank the staff at ETG/Marcraft for making it easy to turn out a good product. In particular, thanks to Cathy Boulay and Luke Johns from the Product Development department for their excellent work in getting the text and graphics ready to go and looking good. Many thanks as well to Jeff Riley, whom I’ve known and worked with in the book production business for many years. Thanks for putting together another great project.
-
Cuber security essentials
James Graham, Richard Howard, Ryan Olson,This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
-
Computer security
William Stallings, Lawrie Brown,In the four and a half years since the first edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field.
-
Sport and Exercise Psychology
Ellis Cashmore,This book is like a supermarket cart after a twenty-minute journey around the aisles: brimming with all manner of assorted products, some essential, others minor extravagancies, but all of which will get used at some point. Like the consumables from the supermarket, the contents of this book will not be enough to get the shopper through the whole week, and visits to other, more specialist stores will be needed. But there will be enough staples to get started, and many of the goods will be kept in the fridge and used at a later stage.
-
The Potter's bible
Marylin Scott,Clay objects have been made for as long as the human race has existed, with functional vessels for storage making their appearance at the same time as the development of agriculture. Many of these pots were decorated in various ways, and in most early societies the potters were held in high regard. In China, Japan, and Classical Greece, pottery became a true art form, clays became ever more refined, and new glazes, decorative techniques, and firing methods were discovered, many of which are still used today.
-
English for IT students
Saidvaliyeva D.R.,O‘quv qoilanmadan talabalar mustaqil ishlarini tashkillashtirishda ham foydanish mumkin, mashqlar talabaning soha yo‘nalishi bo‘yicha bilim, ko‘nikma va malakalarini oshirishi, berilgan mavzular asosida o ‘z fikrlarini ifoda etishi, mavzuni chuqurroq o ‘rganib olishi va mustahkamlashiga, grammatikani kontekstda o ‘rganishiga samarali hissa qo’shadi
-
English for Ecology Students
Т. В. Елисеева, И. Г. Шалимо, И. Л. Шарейко,Пособие состоит из пяти разделов, посвященных актуальным проблемам взаимоотношений человека с природой. В каждом тематическом разделе содержатся аутентичные тексты с заданиями для развития и совершенствования разных видов чтения Цель пособия – обучение студентов извлечению основной информации из текста, выработка умений и навыков реферирования текстов по специальности, а также развитие умений ведения дискуссий на профессиональные темы
-
Security in Computing
Charles P.Pfleeger,Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.
-
RHCE Red Hat Certified Engineer Linux Study Guide
Michael Jang,But you don't have to pay for the operating system or settle for a "trial subscription" to prepare for the RHCE exam. There are a wide variety of efforts to create "rebuilds" of Red Hat Enterprise Linux. The source code for almost all RHEL RPM packages is released under the Linux General Public License (GPL) or related licenses. This gives anyone the right to build Red Hat Enterprise Linux from the Red Hat released source code.
-
Genetics
Karvita B. Ahluwalia,No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher.
-
The Security Intelligence Handbook.Third Edition
Jeff May Cover, Lucas Clauser, Christopher Ahlberg,Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, without the prior written permission of the publisher.
-
Linux System Administration
Tom Adelstein, Bill Lubanovic,As Bill Lubanovic and I were putting the final touches on this book, I overheard a conversation between two coworkers in our Cisco lab discussing Linux. The senior networking guru of the two made an interesting remark. He said that despite all his knowledge, he felt incomplete as a professional because he had never learned Linux. A moment later he and the other gentleman turned to me and looked me square in the eyes. I smiled and went on working.