-
Ilmiy axborot faoliyati. Informatika,
-
-
-
Information Security Management Handbook Sixth Edition (VOLUME 2)
Harold F. Tipton, Micki Krause,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Feature Extraction & Image Processing for Computer Vision. Third edition
Mark S. Nixon, Alberto S. Aguado,Ilmiy axborot faoliyati. Informatika, -
Информатика.3-е перераб.
Макарова Наталья Владимировна, Матвеев Леонид Анатольевич, Бройдо Владимир Львович, Гаврилова Татьяна Альбертовна, Рамин Евгений Львович, Ильина Ольга Павловна,Ilmiy axborot faoliyati. Informatika, -
Android platformasida mobil ilovalarini ishlab chiqish
Jakbarov Odiljon Otamirzayevich, Goyipov Umidjon Gulomjonovich,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
-
Информационная безопасность открытых систем. Том 2.
Запечников С.В., Милославская Н.Г., Толстой А.И., Ушаков Д.В.,Ilmiy axborot faoliyati. Informatika,
-
Malware
Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis,This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
-
Mastering Ethereum
Andreas M. Antonopoulos, Dr. Gavin Wood,The views expressed in this work are those of the authors, and do not represent the publisher’s views. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work.
-
Blockchain Basics
Daniel Drescher,This book fills the gap that exists between purely technical books about the blockchain, on the one hand, and the literature that is mostly concerned with specific applications or discussions about its expected economic impact or visions about its future, on the other hand. The blockchain has received a lot of attention in the public discussion and in the media. Some enthusiasts claim that the blockchain is the biggest invention since the emergence of the Internet. Hence, a lot of books and articles have been written in the past few years about the blockchain. However, if you want to learn more about how the blockchain works, you may find yourself lost in a universe of books that either quickly skim over the technical details or that discuss the underlying technical concepts at a highly formal level. The former may leave you unsatisfied because they miss to explain the technical details necessary to understand and appreciate the blockchain, while the latter may leave you unsatisfied because they already require the knowledge you want to acquire
-
Кибербезопасность
Диогенес Ю., Озкайя Э.,Книга посвящена многим аспектам компьютерной безопасности - начиная от стратегии защиты до управления уязвимостями. В ней рассматриваются различные отраслевые стандарты и передовые методы реагирования, процессы взлома данных и политики безопасности, базовые средства контроля безопасности.
-
Information Security Management Handbook Sixth Edition (VOLUME 2)
Harold F. Tipton, Micki Krause,Information security is an interesting, many times frustrating discipline to institutionalize. The commonly accepted triad—people, process, technology—trips easily off the tongue. However, breaking down the threesome into its subcomponents gives one pause. Information security truly is a complex composite of many fields of study, including sociology, psychology, anthropology, virology, criminology, cryptology, etiology, and technology. Thus, we give tribute here to those who willingly choose to slay the dragons, oftentimes finding themselves tilting at windmills instead.
-
Data Structures and Algorithms Using C#
Michael McMillan,C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing tests rather than Big O notation to analyze the efficiency of an approach. Coverage includes arrays and array lists, linked lists, hash tables, dictionaries, trees, graphs, and sorting and searching algorithms, as well as more advanced algorithms such as probabilistic algorithms and dynamic programming. This is the perfect resource for C# professionals and students alike.
-
Изучаем РНР и MySQL
Бейли Л.,Вы хотите уметь создавать не только статичные, но и динамичные, связанные с базами данных сайты? Тогда вам не обойтись без знания РНР и MySQL. Эта книга является уникальным визуальным руководством, благодаря которому вы усвоите данные техно логии максимально эффективно . Вы не только изучите теорию, но и наберетесь практи ческого опыта, создав целый ряд приближенных к реальным проектов (от рейтинговой системы до сайта знакомств). Вы освоите в деле все важнейшие концепции программи рования на РНР и под MySQL: верификацию форм, работу с сессиями, эффективные запросы к базе данных , операции с файлами и многое другое.
-
HTML и CSS на примерах
Мержевич В. В.,На практических примерах раскрываются технологии HTML и CSS в планс решения различных аспектов создания веб-страниц . Приведены возможности и средства по оформлению текста и изменению его вида .
-
jQuery. Подробное руководство по продвинутому JavaScript.
Бибо Б. , Кац И.,Книга предназначена для разработчиков, знакомых с языком JavaScript и технологией Ajax и стремящихся создавать краткий и понятный программный код. Уникальная способность jQuery составлять «цепочки» из команд позволяет выполнять несколько последовательных операций над элементами страницы, в результате чего код сокращается втрое.
-
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell,Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication channel. While providing privacy remains a central goal, the field has expandeded to encompass many others, including not just other goals of communication security, such as guaranteeing integrity and authenticity of communications, but many more sophisticated and fascinating goals. Once largely the domain of the military, cryptography is now in widespread use, and you are likely to have used it even if you don't know it.
-
Introduction to Modern Cryptography
Mihir Bellare, Phillip Rogaway,Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication channel. While providing privacy remains a central goal, the field has expandeded to encompass many others, including not just other goals of communication security, such as guaranteeing integrity and authenticity of communications, but many more sophisticated and fascinating goals. Once largely the domain of the military, cryptography is now in widespread use, and you are likely to have used it even if you don't know it.
-
The Not So Short Introduction to LATEX 2
Hubert Partl, Irene Hyna and Elisabeth Schleg,This document is free; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This document is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA
-
Компьютерная типография LATEX
Е. М. Балдин,Книга является руководством по использованию текстового процессора LaTeX. Описаны все базовые элементы процесса набора и верстки, упомянуто свыше 1300 команд LaTeX и около 750 пакетов, стилей и классов, которые можно использовать при наборе любых текстовых документов. Рассмотрены создание презентаций, верстка таблиц, вставка графических объектов, формирование библиографии, алфавитного указателя и многие другие задачи.
-
Computer Vision: Algorithms and Applications 2nd Edition
Richard Szeliski,Computer Vision: Algorithms and Applications explores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications where vision is being successfully used, both in specialized applications such as image search and autonomous navigation, as well as for fun, consumer-level tasks that students can apply to their own personal photos and videos.
-
Feature Extraction & Image Processing for Computer Vision. Third edition
Mark S. Nixon, Alberto S. Aguado, -
Информатика.3-е перераб.
Макарова Наталья Владимировна, Матвеев Леонид Анатольевич, Бройдо Владимир Львович, Гаврилова Татьяна Альбертовна, Рамин Евгений Львович, Ильина Ольга Павловна,Рассмотрены разделы информатики, определяющие базовый уровень подготовки специалистов: основы информационной культуры, современные технические средства и программный инструментарий новых информационных технологий (системное и прикладное программное обеспечение, инструментарий создания программных продуктов). Для студентов, изучающих дисциплину "Информатика", преподавателей, слушателей институтов повышения квалификации; может быть использован широким кругом пользователей персонального компьютера.
-
Android platformasida mobil ilovalarini ishlab chiqish
Jakbarov Odiljon Otamirzayevich, Goyipov Umidjon Gulomjonovich,Ushbu darslik bakalavriantning Axborot tizimlari va texnologiyalari yo'nalish talabalari uchun mo'ljallangan bo'lib, unda "Android platformasida mobil ilovalarini ishlab chiqish" fanidan nazariy va amaliy mashg'ulotlariga oid o'quv materiallari hamda o'qitishning innovatsion texnologiyalari asosida darslarni tashkil etish bo'yicha ishlanmalardan ma'lumotlar keltirilgan.Darslikdan magistrlar hamda ilmiy tadqiqotchilar ham foydalanishlari mumkin.
-
Boshlang'ich sinflarda axborot texnologiyalari
K.R.Mamadaliyev, K.D.Riskulova,5111700-Boshlangʻich ta'lim va sport-tarbiyaviy ish ta'lim yoʻnalishlari uchun tayyorlangan "Boshlangʻich şinflarda axborot texnologiyalari" nomli darslik hozirgi kunga qadar bir qator mualliflar tomonidan yaratilgan adabiyotlar, oʻquv qo'llanmalar va xorijiy tajribalar asosida ishlab chiqilib, uning mazmuni modernizatsiyalashtirildi hamda loyihalandi. Yangi avlod oʻquv adabiyoti nafaqat talabalarning qiziqishini oshiradi balki yetarlicha tayyorgarlikka ega bo lmagan oʻqituvchilarning kamchilik- larini ham bartäraf etishga yordam beradi.
-
Kompyuter tarmoqlari
M.R.Yangibayeva,Ushbu darslik "Kompyuter tarmoqlari" faniga tegishli bo'lgan kompyuter tarmoqlari qurilishining asosiy tamoyillari, zamonaviy kompyuter tarmoqlarining turlari, lokol va global kompyuter tarmoq texnologiyalari, hamda ularning ko'rsatkichlariga oid ma`lumotlardan iborat.
-
Информационная безопасность открытых систем. Том 2.
Запечников С.В., Милославская Н.Г., Толстой А.И., Ушаков Д.В.,В учебнике рассматриваются основы информационной безопасности открытых систем на примере интранета. Подробно рассматриваются конкретные средства и системы обеспечения информационной безопасности в открытых системах: аутентификация, межсетевые экраны, виртуальные сети, системы анализа защищенности, системы обнаружения вторжений.