![]() |
Information Systems Security: 11th International Conference, Iciss 2015, Kolkata, India, December 16-20, 2015. Proceedings
ISBN: 9783319269603 / Angielski / Miękka / 584 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography. This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, I... |
cena:
201,24 |
![]() |
Betriebssysteme Und Echtzeit: Echtzeit 2015
ISBN: 9783662486108 / Niemiecki / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mit seinem Workshop 2015 zum Thema "Betriebssysteme und Echtzeit" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen zu folgenden Programmschwerpunkten vorgestellt werden: Schnittstellen und Architekturen, Mikrokernbasierte Betriebssysteme, Anwendungsspezifische Maschneiderung, Bewertung und systematischer Entwurf von Systemschnittstellen, Modellierung und Simulation, Plattformen, Einsatz von Graphik-Coprozessoren, Multi/Manycore-Systemen, Virtualisierung, Energieeffizienz, Sicherheit und... Mit seinem Workshop 2015 zum Thema "Betriebssysteme und Echtzeit" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und... |
cena:
150,44 |
![]() |
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
ISBN: 9783319279978 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Normal 0 false false false EN-US X-NONE X-NONE
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems,...Normal 0 false false false EN-US X-NONE X-NONE
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International C... |
cena:
201,24 |
![]() |
Design Patterns Explained: A New Perspective on Object-Oriented Design
ISBN: 9780321247148 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "One of the great things about the book is the way the authors explain concepts very simply using analogies rather than programming examples-this has been very inspiring for a product I'm working on: an audio-only introduction to OOP and software development." -Bruce Eckel ..".I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between...
"One of the great things about the book is the way the authors explain concepts very simply using analogies rather than programming examples-this has ...
|
cena:
223,87 |
![]() |
Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity
ISBN: 9780128092682 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of... The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and ... |
cena:
235,04 |
![]() |
Learning iOS Penetration Testing
ISBN: 9781785883255 / Angielski / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
194,18 |
![]() |
Information and Communications Security: 17th International Conference, Icics 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
ISBN: 9783319298139 / Angielski / Miękka / 486 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.
The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology. This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Secur...
|
cena:
201,24 |
![]() |
Procedural Content Generation for C++ Game Development
ISBN: 9781785886713 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Simulation for Applied Graph Theory Using Visual C++
ISBN: 9781498721011 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The tool for visualization is Microsoft Visual C++. This popular software has the standard C++ combined with the Microsoft Foundation Classes (MFC) libraries for Windows visualization. This book explains how to create a graph interactively, solve problems in graph theory with minimum number of C++ codes, and provide friendly interfaces that makes learning the topics an interesting one. Each topic in the book comes with working Visual C++ codes which can easily be adapted as solutions to various problems in science and engineering. The tool for visualization is Microsoft Visual C++. This popular software has the standard C++ combined with the Microsoft Foundation Classes (MFC)... |
cena:
881,59 |
![]() |
Lessons in Play: An Introduction to Combinatorial Game Theory, Second Edition
ISBN: 9781482243031 / Angielski / Twarda / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A thorough revision of a popular text in combinatorial game theory, this second edition reorganizes presentation to make it more widely accessible. The beginning focuses less on technical and more on conceptual material and applications. Still written in a textbook style with supporting evidence and proofs, the authors add many more exercises and examples and implement a two-step approach for some aspects of the material involving an initial introduction, examples, and basic results to be followed later by more technical and abstract results. A thorough revision of a popular text in combinatorial game theory, this second edition reorganizes presentation to make it more widely accessible.... |
cena:
377,08 |
![]() |
OS X Incident Response: Scripting and Analysis
ISBN: 9780128044568 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset. Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating... OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known oper... |
cena:
230,14 |
![]() |
Graphs, Algorithms, and Optimization
ISBN: 9781482251166 / Angielski / Twarda / 566 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigorous, but informal style and cover most of the main areas of graph theory. The ideas of surface topology are presented from an intuitive point of view. We have also included a discussion on linear programming that emphasizes problems in graph theory. The text is suitable for students in computer science or mathematics programs.
" The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigo... |
cena:
426,05 |
![]() |
Transactions on Modularity and Composition I
ISBN: 9783319469683 / Angielski / Miękka / 269 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, covering requirement analysis, design, implementation, maintenance, and evolution.
The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, ...
|
cena:
309,98 |
![]() |
Internetware: A New Software Paradigm for Internet Computing
ISBN: 9789811025457 / Angielski / Twarda / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologies to operational platforms, quality measurements and assurance and future directions. It also includes guidelines and numerous representative real-world case studies that serve as an invaluable reference resource for software engineers involved in the development of Internetware applications. Providing a detailed analysis of current trends in modern software engineering in the Internet, it offers an essential blueprint and an important...
This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologie...
|
cena:
402,53 |
![]() |
Internet Der Dinge: Echtzeit 2016
ISBN: 9783662534427 / Niemiecki / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mit seinem Workshop 2016 zum Thema "Internet der Dinge" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen zu folgenden Programmschwerpunkten vorgestellt werden: Echtzeitfahigkeit, Funktionale Sicherheit, Datenschutz und Datensicherheit, Sichere Datenkommunikation, Schnittstellen, Protokolle und Plattformen, Energieeffizienz, Diensteabrechung- und Bezahlung, Erweiterte Realitat (Augmented Reality), Altersgerechte Assistenzsysteme fur selbstbestimmtes Lebenuns Ambient Assited Living. Berichte zu... Mit seinem Workshop 2016 zum Thema "Internet der Dinge" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstelle... |
cena:
150,44 |
![]() |
Technik Informatyk LO Administrowanie sieciowymi..
ISBN: 9788326721502 / Polski / Miękka / 344 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Podręcznik „Administrowanie sieciowymi systemami operacyjnymi” przygotowuje do kształcenia w zawodzie technik informatyk. Zawiera zakres treści określony w podstawie programowej jako E.13.3. Podręcznik może funkcjonować samodzielnie, niezależnie od innych części. Polecany do różnych form kształcenia w technikach, szkołach policealnych lub na kwalifikacyjnych kursach zawodowych.
Podręcznik „Administrowanie sieciowymi systemami operacyjnymi” przygotowuje do kształcenia w zawodzie technik informatyk. Zawiera zakres treści...
|
cena:
47,90 |
![]() |
Das REXX Lexikon: Begriffe, Anweisungen, Funktionen
ISBN: 9783486236729 / Niemiecki / Twarda / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das REXX-Lexikon behandelt samtliche Begriffe, Anweisungen und Funktionen, die fur die Betriebssysteme PC-DOS, OS/2 und MVS/TSO von Bedeutung sind. Die Stichworte, die sich auf den "Grundwortschatz" von REXX beziehen, sind daruberhinaus auch fur alle anderen Betriebssysteme geeignet (OS/400, UNIX, VM/CMS, VSE/ESA, Windows). Das REXX-Lexikon behandelt samtliche Begriffe, Anweisungen und Funktionen, die fur die Betriebssysteme PC-DOS, OS/2 und MVS/TSO von Bedeutung sind.... |
cena:
722,18 |
![]() |
Complex Networks: An Algorithmic Perspective
ISBN: 9781138033894 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering. A key issue in the study of complex networks is to understand the collective behavior of the various elements of these networks. Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering. A key issue in the s... |
cena:
244,84 |
![]() |
Android 6 Programming: Android Studio Development Guide
ISBN: 9781539380054 / Angielski / Miękka / 76 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a guide to Android application developers on how to use Android Studio 6 to develop their apps. The first part is a guide on how to use the Code Editor in Android 6. The Code Editor provides programmers with an environment in which they can write their code, and perform some editing to it. The various features and functionalities provided by the Code Editor are discussed. Auto completion, which helps you to avoid too much typing, is also discussed, and you will learn how to enjoy using this feature. You will also learn how to split the Code Editor window so as to get various panels....
This is a guide to Android application developers on how to use Android Studio 6 to develop their apps. The first part is a guide on how to use the Co...
|
cena:
33,90 |
![]() |
Kubernetes Management Design Patterns: With Docker, Coreos Linux, and Other Platforms
ISBN: 9781484225974 / Angielski / Miękka / 399 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Take container cluster management to the next level; learn how to administer and configure Kubernetes on CoreOS; and apply suitable management design patterns such as Configmaps, Autoscaling, elastic resource usage, and high availability. Some of the other features discussed are logging, scheduling, rolling updates, volumes, service types, and multiple cloud provider zones. The atomic unit of modular container service in Kubernetes is a Pod, which is a group of containers with a common filesystem and networking. The Kubernetes Pod abstraction enables design patterns for containerized...
Take container cluster management to the next level; learn how to administer and configure Kubernetes on CoreOS; and apply suitable management design ...
|
cena:
181,11 |