-
-
Umumtexnikaviy fanlar,
-
-
Umumtexnikaviy fanlar,
-
-
-
-
-
Umumtexnikaviy fanlar,
-
Umumtexnikaviy fanlar,
-
-
-
-
Distributed Network Systems from Concepts to Implementations
Weijia Jia, Ding-Zhu Du, Raghavendra C., Wanlei Zhou,Umumtexnikaviy fanlar, -
-
-
Umumtexnikaviy fanlar,
-
Umumtexnikaviy fanlar,
-
-
-
Procreate artists handbook version 3
Sian Wood,The Procreate Artist's Handbook Version 3 is a comprehensive guide aimed at helping artists maximize their use of the Procreate app, which is a powerful digital illustration and painting tool for the iPad. This handbook is especially popular among both beginners and professionals who work in digital art.
-
Новый англо-русский словарь по электронике .Том2
Ф.В.Лисовский,Словарь содержит около 100 000 терминов и терминологических сочетаний по информатике и электронике, современной элементной базе и технологии производства электронной и вычислительной аппаратуры, глобальным, региональным и локальным компьютерным сетям, различным видам связи, телевидению и видеотехнике, электроакустике, телефонии, устройствам электропитания, СМИ, настольным издательским системам и др. Представлены также следующие области науки и техники: математика, логика, лингвистика, грамматика, теория игр, общая физика и химия, электродинамика, оптика, физика твердого тела, квантовая механика и др. В конце словаря приведен список 7000 английских сокращений с русскими эквивалентами. Словарь предназначен для самого широкого круга пользователей - студентов, аспирантов, преподавателей, переводчиков, инженеров, технологов, научных работников, а также для административно-управленческого персонала и предпринимателей.
-
Security in Computing
Charles P.Pfleeger,Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the eBook in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a “Click here to view code image” link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.
-
RHCE Red Hat Certified Engineer Linux Study Guide
Michael Jang,But you don't have to pay for the operating system or settle for a "trial subscription" to prepare for the RHCE exam. There are a wide variety of efforts to create "rebuilds" of Red Hat Enterprise Linux. The source code for almost all RHEL RPM packages is released under the Linux General Public License (GPL) or related licenses. This gives anyone the right to build Red Hat Enterprise Linux from the Red Hat released source code.
-
Linux System Administration
Tom Adelstein, Bill Lubanovic,As Bill Lubanovic and I were putting the final touches on this book, I overheard a conversation between two coworkers in our Cisco lab discussing Linux. The senior networking guru of the two made an interesting remark. He said that despite all his knowledge, he felt incomplete as a professional because he had never learned Linux. A moment later he and the other gentleman turned to me and looked me square in the eyes. I smiled and went on working.
-
Linux
Richard Blum,The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation.
-
Linux Bible
Christopher Negus,The rest of this book provides you with hands-on activities to help you gain that expertise. Finally, I show you how to apply that expertise to cloud technologies, including automation tools, such as Ansible, and containerization orchestration technologies, such as Kubernetes and OpenShift.
-
Applied Cryptography
Bruce Schneier,Cryptography was being used by the few who cared. We could encrypt our e-mail with PCP, but mostly we didn't. We could encrypt sensitive files, but mostly we didn't. I don't remember having the option of a usable full-disk encryption product, at least one that I would trust to be reliable. What we did have were ideas-research and engineering ideas-and that was the point of Applied Cryptography. My goal in writing the book was to collect all the good ideas of academic cryptography under one cover and in a form that non-mathematicians could read and use.
-
A Graduate Course in Applied Cryptography
Dan Boneh , Victor Shoup,This book is about exactly that: constructing practical cryptosystems for which we can argue security under plausible assumptions.
-
Operating System Concepts and Basic Linux Commands
Shubham Vihar,The opinions/ contents expressed in this book are solely of the authors and do not represent the opinions/ standings/ thoughts of Educreation or the Editors . The book is released by using the services of self-publishing house
-
Computer Security
William Stallings, Lawrie Brown,Since the third edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. To begin the process of revision, the third edition of this book was extensively reviewed by a number of professors who teach the subject and by professionals working in the field. The result is that in many places the narrative has been clarified and tightened, and illustrations have been improved.
-
Cloud Computing Technology
[],This work is subject to copyright. All commercial rights are reserved by the author(s), whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Regarding these commercial rights a non-exclusive license has been granted to the publisher.
-
Cloud Computing
Thomas Erl, Eric Barceló Monroy,This book is a solid and comprehensive overview of the cloud concepts and the real mechanics of how the cloud works. It does a nice job of not only explaining cloud function and architecture but the business impact. It’s a great foundation for creating a cloud roadmap.
-
Distributed Network Systems from Concepts to Implementations
Weijia Jia, Ding-Zhu Du, Raghavendra C., Wanlei Zhou,Both authors have taught the course of “Distributed Systems” for many years in the respective schools. During the teaching, we feel strongly that “Distributed systems” have evolved from traditional “LAN” based distributed systems towards “Internet based” systems. Although there exist many excellent textbooks on this topic, because of the fast development of distributed systems and network programming/protocols, we have difficulty in finding an appropriate textbook for the course of “distributed systems” with orientation to the requirement of the undergraduate level study for today’s distributed technology. Specifically, from - to-date concepts, algorithms, and models to implementations for both distributed system designs and application programming. Thus the philosophy behind this book is to integrate the concepts, algorithm designs and implementations of distributed systems based on network programming. After using several materials of other textbooks and research books, we found that many texts treat the distributed systems with separation of concepts, algorithm design and network programming and it is very difficult for students to map the concepts of distributed systems to the algorithm design, prototyping and implementations. This book intends to enable readers, especially postgraduates and senior undergraduate level, to study up-to-date concepts, algorithms and network programming skills for building modern distributed systems. It enables students not only to master the concepts of distributed network system but also to readily use the material introduced into implementation practices.
-
The dynamics of mass communication
Dominick J.,He taught for four years at Queens College of the City University of New York before coming to the College ofJournalism and Mass Communication at the University of Georgia where, from 1980 to 1985, he served as head of the Radio-TV-Film Sequence. He currently serves as the college’s Director of Graduate Studies.
-
-
Spring microservices in action
John Carnell, Illary Huaylupo Sanchez,Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in the book, and Manning Publications was aware of a trademark claim, the designations have been printed in initial caps or all caps
-
Java the Complete Reference Twelfth Edition
[], Herbert Schildt,He is the author of numerous books on Java, including Java: A Beginner's Guide, Herb Schildt's Java Programming Cookbook, Introducing JavaFX 8 Programming, and Swing: A Beginner's Guide. He has also written extensively about C, C++, and C#. Featured as one of the rock star programmers in Ed Burns' book Secrets of the Rock Star Programmers: Riding the IT Crest, Schildt is interested in all facets of computing, but his primary focus is computer languages.
-
Operating System Concept and Principles
The author has received his Ph D in Physics from Indian Institute of Technology, Delhi and continued there with Post Doctoral research for some more time before moving to Panjab University, Chandigarh for Senior Post Doctoral research. Hejoined CMC in 1985. After a short period in software projects, he moved to the Education and Training division ofCMC where be has been teaching. He has produced several titles to support various kinds of computer courses offered by CMC. Students greatly appreciated his teaching and writing.
-
English in ICT
D.N. Abduvaxabova, G.S. Saydaliyeva.,English in ICT‖ is B2 level English manual for the students of Computer Science and Technical English in Higher Education. It aims to help these students to extend and develop a wide variety of language skills and to acquire a knowledge of technology in English. Motivating and informative, authentic and semi-authentic texts to improve both reading and listening skills with variety topics are presented in themed topics. Interactive activities focus on learners‘ ―can do‖ statements and follow the principles of the Common European Framework of Reference requirements.