-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
The Security Intelligence Handbook.Third Edition
Jeff May Cover, Lucas Clauser, Christopher Ahlberg,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Effective Windows 95
Fritz J. Erickson,We wrote the Effective Series because we wanted a computer application textbook help us teach. At the time, most computer applications texts were written like cookbooks.
-
Data structures and algorithms using C#
Michael Mcmillan,C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing tests rather than Big O notation to analyze the efficiency of an approach. Coverage includes array and ArrayLists, linked lists, hash tables, dictionaries, trees, graphs, and sorting and searching algorithms, as well as more advanced algorithms such as probabilistic algorithms and dynamic programming. This is the perfect resource for C# professionals and students alike.
-
Bodendenkmalpflege in Mecklenburg
Ewald Schuld,Das Buch „Bodendenkmalpflege in Mecklenburg“ von Ewald Schuldt beschäftigt sich mit dem Schutz, der Erforschung und der Pflege archäologischer Denkmäler im Gebiet Mecklenburg. Der Autor beschreibt die Bedeutung von Bodendenkmälern als wichtige Quellen für die Geschichte und Kultur der Region. Im Mittelpunkt stehen Methoden der archäologischen Untersuchung, Dokumentation und Erhaltung. Außerdem wird die Zusammenarbeit zwischen Wissenschaftlern, Behörden und der Öffentlichkeit hervorgehoben.
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Издание представляет собой введение и справочное руководство по jQuery — мощной платформе для разработки веб-приложений. одробно описывается, как выполнять обход документов HTML, обрабатывать события, добавлять поддержку технологии Ajax в свои веб-страницы, воспроизводить анимацию и визуальные эффекты. Уникальные "лабораторные страницы" помогут закрепить изучение каждой новой концепции на практических примерах. Рассмотрены вопросы взаимодействия jQuery с другими инструментами и платформами и методы создания модулей расширения для этой библиотеки.
-
Mastering Malware Analysis
Alexey Kleymenov, Amr Thabet,Ahmed Neil is a well-known thought leader in the cybersecurity domain whose work focuses on information security, threat hunting, threat intelligence, malware analysis, and digital forensics. He also has a passion for academic research in the field of cybersecurity. He holds an MSc in computer forensics and is currently working at IBM as a cybersecurity engineer (operations).
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Modern technologists are masters at the art of searching Google for answers. If another system administrator has already encountered (and possibly solved) a problem, chances are you can find their write-up on the Internet. We applaud and encourage this open sharing of ideas and solutions.
-
Cybersecurity-Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya,All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.
-
IT Governance
Alan Calder, Steve Watkins,Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned addresses:
-
The Cyber Security Body of Knowledge
Awais Rashid,We are pleased to share CyBOK Version 1.1.0 with you. This version has added two new Knowledge Areas to CyBOK: Applied Cryptography and Formal Methods for Security. It also includes a major revision to Network Security, a minor revision to Risk Management & Governance and a host of small typographical xes. We have also added an extensive index of terms as a lookup mechanism.
-
Cybersecurity handbook
As information and communication technologies create a world of everincreasing complexity in interconnected systems and devices, the public debate on cybersecurity and privacy issues is constantly at the forefront, highlighting the need to strengthen the protection and resilience of these systems from the constantly evolving threats of modern cyberspace.
-
CYBERSECURITY
Charles J . Brooks, Christopher Grow, Philip Craig, Donald Short,As always, I want to thank the staff at ETG/Marcraft for making it easy to turn out a good product. In particular, thanks to Cathy Boulay and Luke Johns from the Product Development department for their excellent work in getting the text and graphics ready to go and looking good. Many thanks as well to Jeff Riley, whom I’ve known and worked with in the book production business for many years. Thanks for putting together another great project.
-
Cuber security essentials
James Graham, Richard Howard, Ryan Olson,This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
-
Computer security
William Stallings, Lawrie Brown,In the four and a half years since the first edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field.
-
The Security Intelligence Handbook.Third Edition
Jeff May Cover, Lucas Clauser, Christopher Ahlberg,Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, without the prior written permission of the publisher.
-
Microsoft Windows server administration
Jeff Kellum, Tom Carpenter,Thank you for choosing Microsoft Windows Server Administration Essentials. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experience with a gift for teaching.
-
Linux Networking Cookbook
Gregory Boyce,Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author(s), nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
-
Computer Security
William Stallings, Lawrie Brown,Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.
-
Kompyuter tarmoqlari chuqurlashtirilgan kursi
X.Zayniddinov,Mazkur o'quv qo'llanma Germaniya texnikaviy hamkorlik tashkiloti (GTZ) hamda Germaniya taraqqiyot banki (KfW)ishtirokidagi :Axborot-kommunikarsiya texnologiyalari sohasida kasb-hunar ta'limini rivojlantirishga ko'maklashish " loyihasi doirasida ishlab chiqilgan.
-
Modern Operating Systems
Andrew S.Tanebaum, Herbert Bos,The fourth edition of this book differs from the third edition in numerous ways.There are large numbers of small changes everywhere to bring the material up todate as operating systems are not standing still.The chapter on Multimedia Operating Systems has been moved to the Web,primarily to make room for new material and keep the book from growing to a completely unmanageable size.