-
-
-
Ilmiy axborot faoliyati. Informatika,
-
Электрон кутубхона тармоқларида илмий-таълимий ахборотлар яратиш ва улардан фойдаланиш технологиялари
М.А. Раҳматуллаев,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
-
-
-
Ilmiy axborot faoliyati. Informatika,
-
-
Ilmiy axborot faoliyati. Informatika,
-
Effective Windows 95
Fritz J. Erickson,We wrote the Effective Series because we wanted a computer application textbook help us teach. At the time, most computer applications texts were written like cookbooks.
-
Ettective Word 7 0
Fritz J.Erickson,The aim of this book is to arouse curiosity about English words and about the nature of language in general, especially among students who are not intending to specialise in linguistics. The book covers a wide range of topics, including the structure of words, the meaning of words, how their spelling relates to pronunciation, how new words are manufactured or imported from other languages, and how the meaning of words changes with the passage of time. It also investigates how the mind deals with words by highlighting the amazing intellectual feat performed routinely when the right word is retrieved from the mental dictionary during conversation. Words of all sorts are examined—from great poetry, nonsense verse and journalism to advertising. It is demonstrated that in their very different ways they are all worthy of serious study.
-
Data structures and algorithms using C#
Michael Mcmillan,C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the programmer. The approach is very practical, using timing tests rather than Big O notation to analyze the efficiency of an approach. Coverage includes array and ArrayLists, linked lists, hash tables, dictionaries, trees, graphs, and sorting and searching algorithms, as well as more advanced algorithms such as probabilistic algorithms and dynamic programming. This is the perfect resource for C# professionals and students alike.
-
Электрон кутубхона тармоқларида илмий-таълимий ахборотлар яратиш ва улардан фойдаланиш технологиялари
М.А. Раҳматуллаев,Электрон кутубхона тармоқларида илмий-таълимий ахборотлар яратиш ва улардан фойдаланиш технологиялари ёритилган.Электрон илмий-таълимий ресурслар ва электрон кутубхона яратиш технологиялари буйича хар йили утказиладиган семинарлар тупламининг навбатдаги нашрига шу номдаги материаллар киритилган.
-
Bodendenkmalpflege in Mecklenburg
Ewald Schuld,Das Buch „Bodendenkmalpflege in Mecklenburg“ von Ewald Schuldt beschäftigt sich mit dem Schutz, der Erforschung und der Pflege archäologischer Denkmäler im Gebiet Mecklenburg. Der Autor beschreibt die Bedeutung von Bodendenkmälern als wichtige Quellen für die Geschichte und Kultur der Region. Im Mittelpunkt stehen Methoden der archäologischen Untersuchung, Dokumentation und Erhaltung. Außerdem wird die Zusammenarbeit zwischen Wissenschaftlern, Behörden und der Öffentlichkeit hervorgehoben.
-
J Query in Action Подробное руководство по производству Javascript
Бер Бибо, Иегуда кац,Издание представляет собой введение и справочное руководство по jQuery — мощной платформе для разработки веб-приложений. одробно описывается, как выполнять обход документов HTML, обрабатывать события, добавлять поддержку технологии Ajax в свои веб-страницы, воспроизводить анимацию и визуальные эффекты. Уникальные "лабораторные страницы" помогут закрепить изучение каждой новой концепции на практических примерах. Рассмотрены вопросы взаимодействия jQuery с другими инструментами и платформами и методы создания модулей расширения для этой библиотеки.
-
Mastering Malware Analysis
Alexey Kleymenov, Amr Thabet,Ahmed Neil is a well-known thought leader in the cybersecurity domain whose work focuses on information security, threat hunting, threat intelligence, malware analysis, and digital forensics. He also has a passion for academic research in the field of cybersecurity. He holds an MSc in computer forensics and is currently working at IBM as a cybersecurity engineer (operations).
-
Malware
Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis,This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
-
The Impact of Artificial Intelligence on the Future of Cybersecurity
Mariam Aldhamer,Artificial Intelligence (AI) is rapidly transforming various aspects of our lives, including cybersecurity. As the threat landscape becomes increasingly complex and sophisticated, traditional cybersecurity measures alone are no longer sufficient. AI presents a game-changing opportunity to enhance cybersecurity defenses and mitigate the risks posed by cyber-attacks.
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Modern technologists are masters at the art of searching Google for answers. If another system administrator has already encountered (and possibly solved) a problem, chances are you can find their write-up on the Internet. We applaud and encourage this open sharing of ideas and solutions.
-
Cybersecurity-Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya,All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.
-
Mastering Blockchain. Second Edition
Imran Bashir,Imran has sixteen years' of experience in the public and financial sectors. He worked on large scale IT projects in the public sector before moving to the financial services industry. Since then, he has worked in various technical roles for different financial companies in Europe's financial capital, London.
-
Mastering Ethereum
Andreas M. Antonopoulos, Dr. Gavin Wood,The views expressed in this work are those of the authors, and do not represent the publisher’s views. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work.
-
Blockchain Basics
Daniel Drescher,This book fills the gap that exists between purely technical books about the blockchain, on the one hand, and the literature that is mostly concerned with specific applications or discussions about its expected economic impact or visions about its future, on the other hand. The blockchain has received a lot of attention in the public discussion and in the media. Some enthusiasts claim that the blockchain is the biggest invention since the emergence of the Internet. Hence, a lot of books and articles have been written in the past few years about the blockchain. However, if you want to learn more about how the blockchain works, you may find yourself lost in a universe of books that either quickly skim over the technical details or that discuss the underlying technical concepts at a highly formal level. The former may leave you unsatisfied because they miss to explain the technical details necessary to understand and appreciate the blockchain, while the latter may leave you unsatisfied because they already require the knowledge you want to acquire
-
Кибербезопасность
Диогенес Ю., Озкайя Э.,Книга посвящена многим аспектам компьютерной безопасности - начиная от стратегии защиты до управления уязвимостями. В ней рассматриваются различные отраслевые стандарты и передовые методы реагирования, процессы взлома данных и политики безопасности, базовые средства контроля безопасности.
-
IT Governance
Alan Calder, Steve Watkins,Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned addresses:
-
The Cyber Security Body of Knowledge
Awais Rashid,We are pleased to share CyBOK Version 1.1.0 with you. This version has added two new Knowledge Areas to CyBOK: Applied Cryptography and Formal Methods for Security. It also includes a major revision to Network Security, a minor revision to Risk Management & Governance and a host of small typographical xes. We have also added an extensive index of terms as a lookup mechanism.
-
Cybersecurity handbook
As information and communication technologies create a world of everincreasing complexity in interconnected systems and devices, the public debate on cybersecurity and privacy issues is constantly at the forefront, highlighting the need to strengthen the protection and resilience of these systems from the constantly evolving threats of modern cyberspace.
-
CYBERSECURITY
Charles J . Brooks, Christopher Grow, Philip Craig, Donald Short,As always, I want to thank the staff at ETG/Marcraft for making it easy to turn out a good product. In particular, thanks to Cathy Boulay and Luke Johns from the Product Development department for their excellent work in getting the text and graphics ready to go and looking good. Many thanks as well to Jeff Riley, whom I’ve known and worked with in the book production business for many years. Thanks for putting together another great project.