-
Ilmiy axborot faoliyati. Informatika,
-
-
Information Security Management Handbook Sixth Edition (VOLUME 2)
Harold F. Tipton, Micki Krause,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Feature Extraction & Image Processing for Computer Vision. Third edition
Mark S. Nixon, Alberto S. Aguado,Ilmiy axborot faoliyati. Informatika, -
-
-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
-
-
-
-
Ilmiy axborot faoliyati. Informatika,
-
Malware
Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis,This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
-
Mastering Ethereum
Andreas M. Antonopoulos, Dr. Gavin Wood,The views expressed in this work are those of the authors, and do not represent the publisher’s views. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work.
-
Blockchain Basics
Daniel Drescher,This book fills the gap that exists between purely technical books about the blockchain, on the one hand, and the literature that is mostly concerned with specific applications or discussions about its expected economic impact or visions about its future, on the other hand. The blockchain has received a lot of attention in the public discussion and in the media. Some enthusiasts claim that the blockchain is the biggest invention since the emergence of the Internet. Hence, a lot of books and articles have been written in the past few years about the blockchain. However, if you want to learn more about how the blockchain works, you may find yourself lost in a universe of books that either quickly skim over the technical details or that discuss the underlying technical concepts at a highly formal level. The former may leave you unsatisfied because they miss to explain the technical details necessary to understand and appreciate the blockchain, while the latter may leave you unsatisfied because they already require the knowledge you want to acquire
-
Information Security Management Handbook Sixth Edition (VOLUME 2)
Harold F. Tipton, Micki Krause,Information security is an interesting, many times frustrating discipline to institutionalize. The commonly accepted triad—people, process, technology—trips easily off the tongue. However, breaking down the threesome into its subcomponents gives one pause. Information security truly is a complex composite of many fields of study, including sociology, psychology, anthropology, virology, criminology, cryptology, etiology, and technology. Thus, we give tribute here to those who willingly choose to slay the dragons, oftentimes finding themselves tilting at windmills instead.
-
Data Structures and Algorithms Using C#
Michael McMillan,C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing tests rather than Big O notation to analyze the efficiency of an approach. Coverage includes arrays and array lists, linked lists, hash tables, dictionaries, trees, graphs, and sorting and searching algorithms, as well as more advanced algorithms such as probabilistic algorithms and dynamic programming. This is the perfect resource for C# professionals and students alike.
-
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell,Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication channel. While providing privacy remains a central goal, the field has expandeded to encompass many others, including not just other goals of communication security, such as guaranteeing integrity and authenticity of communications, but many more sophisticated and fascinating goals. Once largely the domain of the military, cryptography is now in widespread use, and you are likely to have used it even if you don't know it.
-
Introduction to Modern Cryptography
Mihir Bellare, Phillip Rogaway,Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication channel. While providing privacy remains a central goal, the field has expandeded to encompass many others, including not just other goals of communication security, such as guaranteeing integrity and authenticity of communications, but many more sophisticated and fascinating goals. Once largely the domain of the military, cryptography is now in widespread use, and you are likely to have used it even if you don't know it.
-
The Not So Short Introduction to LATEX 2
Hubert Partl, Irene Hyna and Elisabeth Schleg,This document is free; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This document is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
-
Computer Vision: Algorithms and Applications 2nd Edition
Richard Szeliski,Computer Vision: Algorithms and Applications explores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications where vision is being successfully used, both in specialized applications such as image search and autonomous navigation, as well as for fun, consumer-level tasks that students can apply to their own personal photos and videos.
-
Feature Extraction & Image Processing for Computer Vision. Third edition
Mark S. Nixon, Alberto S. Aguado, -
Building Secure Servers with Linux
Michael D.Bauer,While every precaution has been taken in the preparation of this book,the publisher and author assume no responsibility for errors or omissions,or for damages resulting from the use of the information contained herein.
-
English for programmers
Sultanova Kh.J.,English for Programmers» is accessible for pre-intermediate and above level students of technical universities of «Computer Engineering» (B5330500) course. The purpose of the course book is to develop students' speaking, reading, writing and listening skills and to extend and improve the accuracy of students’ vocabulary and speech.
-
Comedex Computer Course Kit
Er. V.K. Jain,This book and the enclosed CD may not be duplicated in any way without the express written consent of the publisher, except in the form of brief excerpts or quotations for the purposes of review. The informationcontained herein is for the personal use of the reader and may not be incorporated in any commercial programs, other books, databases, or any kind of software without written consent of thepublisher. Making copies of thisbook or any portion for any purpose other than your own isa violation ofСолае copyright laws. Combn
-
Python Cookbook 3rd edition
David Beazley&Brian K.Jones,Just as Python 3 is about the future, this edition of the Python Cookbook represents a major change over past editions. First and foremost, this is meant to be a very forward looking book. All of the recipes have been written and tested with Python 3.3 without regard to past Python versions or the “old way” of doing things. In fact, many of the recipes will only work with Python 3.3 and above. Doing so may be a calculated risk,but the ultimate goal is to write a book of recipes based on the most modern tools andidioms possible. It is hoped that the recipes can serve as a guide for people writing new code in Python 3 or those who hope to modernize existing code.
-
Computer algorithms
Ellis Horowitz Sartaj Sahni Sanguthevar Rajasekaran,A book which contains every algorithm ever invented would be exceedingly large. Traditionally, algorithms books proceeded by examining only asmall number of problem areas in depth. For each specific problem the most efficient algorithm for its solution is usually presented and analyzed. Thisapproach has one major flaw. Though the student sees many fast algorithms and nay master the tools of analysis, she/he remains unconfident about how to devise good algorithms in the first place.
-
IT related English
G.Suleymanova,Information Technology (IT) is a very important, specialized, and in-demand profession. Generally speaking, Information Technicians are professionals who maintain communications and ensure that computer systems are running smoothly. However, within the occupation of IT, there are many variations and specialized job roles.
-
How Linux Works
Brian ward,Al right reserved .No part of this work may be reproduced or transmitted in any from or by any mean electronic or machanical, includingf photocopying recording or by any information storage or retreised system without the written permission of the copyright owner and the publiusher.
-
Office 2003 XML
Evan Lenz, Mary McRae,For many users the appearance of Office 2003 has meant a slightly updated version of a familiar tool another episode in the continouse development of a popular and widely -used piece of software.
-
Dynamic HTML
Danny Goodman,Nutshell Handbook the Nutshell handbook logo and the O'Reilly logo are registred trademaks of O'Reilly &Associates .
-
Software testing and quality assurance
Kashirasagar Naik, Priyadarshi Tripathy,Not part of this publication may be reproduced stored in a retieveal system or transmitted in any from or by any means.