• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Operating Systems - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Operating Systems - General

ilość książek w kategorii: 1738

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Systems Security: 11th International Conference, Iciss 2015, Kolkata, India, December 16-20, 2015. Proceedings Jajoda, Sushil 9783319269603 Springer
Information Systems Security: 11th International Conference, Iciss 2015, Kolkata, India, December 16-20, 2015. Proceedings

ISBN: 9783319269603 / Angielski / Miękka / 584 str.

ISBN: 9783319269603/Angielski/Miękka/584 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajoda; Chandan Mazumdar; Sushil Jajodia

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015.

The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.


This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, I...

cena: 201,24

 Betriebssysteme Und Echtzeit: Echtzeit 2015 Halang, Wolfgang A. 9783662486108 Springer Vieweg
Betriebssysteme Und Echtzeit: Echtzeit 2015

ISBN: 9783662486108 / Niemiecki / Miękka / 136 str.

ISBN: 9783662486108/Niemiecki/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wolfgang A. Halang; Olaf Spinczyk

Mit seinem Workshop 2015 zum Thema "Betriebssysteme und Echtzeit" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen zu folgenden Programmschwerpunkten vorgestellt werden: Schnittstellen und Architekturen, Mikrokernbasierte Betriebssysteme, Anwendungsspezifische Maschneiderung, Bewertung und systematischer Entwurf von Systemschnittstellen, Modellierung und Simulation, Plattformen, Einsatz von Graphik-Coprozessoren, Multi/Manycore-Systemen, Virtualisierung, Energieeffizienz, Sicherheit und...

Mit seinem Workshop 2015 zum Thema "Betriebssysteme und Echtzeit" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und...

cena: 150,44

 Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers Yung, Moti 9783319279978 Springer
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers

ISBN: 9783319279978 / Angielski / Miękka / 442 str.

ISBN: 9783319279978/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Moti Yung; Liehuang Zhu; Yanjiang Yang
Normal 0 false false false EN-US X-NONE X-NONE

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014.

The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems,...
Normal 0 false false false EN-US X-NONE X-NONE

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International C...

cena: 201,24

 Design Patterns Explained: A New Perspective on Object-Oriented Design James Trott 9780321247148 Pearson Education (US)
Design Patterns Explained: A New Perspective on Object-Oriented Design

ISBN: 9780321247148 / Angielski / Miękka / 480 str.

ISBN: 9780321247148/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Trott
"One of the great things about the book is the way the authors explain concepts very simply using analogies rather than programming examples-this has been very inspiring for a product I'm working on: an audio-only introduction to OOP and software development."

-Bruce Eckel

..".I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between...
"One of the great things about the book is the way the authors explain concepts very simply using analogies rather than programming examples-this has ...
cena: 223,87

 Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity Hosmer, Chet 9780128092682 Syngress Publishing
Executing Windows Command Line Investigations: While Ensuring Evidentiary Integrity

ISBN: 9780128092682 / Angielski / Miękka / 228 str.

ISBN: 9780128092682/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chet Hosmer

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations.

The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of...

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and ...

cena: 235,04

 Learning iOS Penetration Testing Yermalkar, Swaroop 9781785883255 Packt Publishing
Learning iOS Penetration Testing

ISBN: 9781785883255 / Angielski / Miękka / 204 str.

ISBN: 9781785883255/Angielski/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Swaroop Yermalkar
cena: 194,18

 Information and Communications Security: 17th International Conference, Icics 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers Qing, Sihan 9783319298139 Springer
Information and Communications Security: 17th International Conference, Icics 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers

ISBN: 9783319298139 / Angielski / Miękka / 486 str.

ISBN: 9783319298139/Angielski/Miękka/486 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongmei Liu; Sihan Qing; Eiji Okamoto
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.
The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Secur...
cena: 201,24

 Procedural Content Generation for C++ Game Development Dale Green 9781785886713 Packt Publishing
Procedural Content Generation for C++ Game Development

ISBN: 9781785886713 / Angielski / Miękka / 304 str.

ISBN: 9781785886713/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dale Green
cena: 237,33

 Simulation for Applied Graph Theory Using Visual C++ Shaharuddin Salleh Zuraida Abal Abas 9781498721011 CRC Press
Simulation for Applied Graph Theory Using Visual C++

ISBN: 9781498721011 / Angielski / Twarda / 354 str.

ISBN: 9781498721011/Angielski/Twarda/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shaharuddin Salleh; Zuraida Abal Abas

The tool for visualization is Microsoft Visual C++. This popular software has the standard C++ combined with the Microsoft Foundation Classes (MFC) libraries for Windows visualization. This book explains how to create a graph interactively, solve problems in graph theory with minimum number of C++ codes, and provide friendly interfaces that makes learning the topics an interesting one. Each topic in the book comes with working Visual C++ codes which can easily be adapted as solutions to various problems in science and engineering.


The tool for visualization is Microsoft Visual C++. This popular software has the standard C++ combined with the Microsoft Foundation Classes (MFC)...

cena: 881,59

 Lessons in Play: An Introduction to Combinatorial Game Theory, Second Edition Michael Albert Richard J. Nowakowski David Wolfe 9781482243031 Apple Academic Press Inc.
Lessons in Play: An Introduction to Combinatorial Game Theory, Second Edition

ISBN: 9781482243031 / Angielski / Twarda / 346 str.

ISBN: 9781482243031/Angielski/Twarda/346 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Albert;Richard J. Nowakowski;David Wolfe

A thorough revision of a popular text in combinatorial game theory, this second edition reorganizes presentation to make it more widely accessible. The beginning focuses less on technical and more on conceptual material and applications. Still written in a textbook style with supporting evidence and proofs, the authors add many more exercises and examples and implement a two-step approach for some aspects of the material involving an initial introduction, examples, and basic results to be followed later by more technical and abstract results.


A thorough revision of a popular text in combinatorial game theory, this second edition reorganizes presentation to make it more widely accessible....

cena: 377,08

 OS X Incident Response: Scripting and Analysis Bradley, Jaron 9780128044568 Syngress Publishing
OS X Incident Response: Scripting and Analysis

ISBN: 9780128044568 / Angielski / Miękka / 270 str.

ISBN: 9780128044568/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jaron Bradley

OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts of OS X, analysts will set themselves apart by acquiring an up-and-coming skillset.

Digital forensics is a critical art and science. While forensics is commonly thought of as a function of a legal investigation, the same tactics and techniques used for those investigations are also important in a response to an incident. Digital evidence is not only critical in the course of investigating...

OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known oper...

cena: 230,14

 Graphs, Algorithms, and Optimization William Kocay Donald L. Kreher 9781482251166 CRC Press
Graphs, Algorithms, and Optimization

ISBN: 9781482251166 / Angielski / Twarda / 566 str.

ISBN: 9781482251166/Angielski/Twarda/566 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
William Kocay; Donald L. Kreher

The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigorous, but informal style and cover most of the main areas of graph theory. The ideas of surface topology are presented from an intuitive point of view. We have also included a discussion on linear programming that emphasizes problems in graph theory. The text is suitable for students in computer science or mathematics programs.

"

The second edition of this popular book presents the theory of graphs from an algorithmic viewpoint. The authors present the graph theory in a rigo...

cena: 426,05

 Transactions on Modularity and Composition I Shigeru Chiba Mario Sudholt Patrick Eugster 9783319469683 Springer
Transactions on Modularity and Composition I

ISBN: 9783319469683 / Angielski / Miękka / 269 str.

ISBN: 9783319469683/Angielski/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shigeru Chiba; Mario Sudholt; Patrick Eugster
The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, covering requirement analysis, design, implementation, maintenance, and evolution.
The LNCS Transactions on Modularity and Composition are devoted to all aspects of software modularity and composition methods, tools, and techniques, ...
cena: 309,98

 Internetware: A New Software Paradigm for Internet Computing Mei, Hong 9789811025457 Springer
Internetware: A New Software Paradigm for Internet Computing

ISBN: 9789811025457 / Angielski / Twarda / 442 str.

ISBN: 9789811025457/Angielski/Twarda/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hong Mei; Jian LV
This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologies to operational platforms, quality measurements and assurance and future directions. It also includes guidelines and numerous representative real-world case studies that serve as an invaluable reference resource for software engineers involved in the development of Internetware applications. Providing a detailed analysis of current trends in modern software engineering in the Internet, it offers an essential blueprint and an important...
This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologie...
cena: 402,53

 Internet Der Dinge: Echtzeit 2016 Halang, Wolfgang a. 9783662534427 Springer Vieweg
Internet Der Dinge: Echtzeit 2016

ISBN: 9783662534427 / Niemiecki / Miękka / 142 str.

ISBN: 9783662534427/Niemiecki/Miękka/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wolfgang a. Halang; Herwig Unger

Mit seinem Workshop 2016 zum Thema "Internet der Dinge" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstellern ein Forum an, auf dem neue Trends und Entwicklungen zu folgenden Programmschwerpunkten vorgestellt werden: Echtzeitfahigkeit, Funktionale Sicherheit, Datenschutz und Datensicherheit, Sichere Datenkommunikation, Schnittstellen, Protokolle und Plattformen, Energieeffizienz, Diensteabrechung- und Bezahlung, Erweiterte Realitat (Augmented Reality), Altersgerechte Assistenzsysteme fur selbstbestimmtes Lebenuns Ambient Assited Living. Berichte zu...

Mit seinem Workshop 2016 zum Thema "Internet der Dinge" bietet der GI/GMA/ITG-Fachausschuss Echtzeitsysteme Wissenschaftlern, Nutzern und Herstelle...

cena: 150,44

 Technik Informatyk LO Administrowanie sieciowymi.. Grudziński Adam Szymczak Michał 9788326721502 Nowa Era
Technik Informatyk LO Administrowanie sieciowymi..

ISBN: 9788326721502 / Polski / Miękka / 344 str.

ISBN: 9788326721502/Polski/Miękka/344 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Grudziński Adam;Szymczak Michał
Podręcznik „Administrowanie sieciowymi systemami operacyjnymi” przygotowuje do kształcenia w zawodzie technik informatyk. Zawiera zakres treści określony w podstawie programowej jako E.13.3. Podręcznik może funkcjonować samodzielnie, niezależnie od innych części. Polecany do różnych form kształcenia w technikach, szkołach policealnych lub na kwalifikacyjnych kursach zawodowych.
Podręcznik „Administrowanie sieciowymi systemami operacyjnymi” przygotowuje do kształcenia w zawodzie technik informatyk. Zawiera zakres treści...
cena: 47,90

 Das REXX Lexikon: Begriffe, Anweisungen, Funktionen Gerhard Leibrock 9783486236729 Walter de Gruyter
Das REXX Lexikon: Begriffe, Anweisungen, Funktionen

ISBN: 9783486236729 / Niemiecki / Twarda / 598 str.

ISBN: 9783486236729/Niemiecki/Twarda/598 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerhard Leibrock

Das REXX-Lexikon behandelt samtliche Begriffe, Anweisungen und Funktionen, die fur die Betriebssysteme PC-DOS, OS/2 und MVS/TSO von Bedeutung sind. Die Stichworte, die sich auf den "Grundwortschatz" von REXX beziehen, sind daruberhinaus auch fur alle anderen Betriebssysteme geeignet (OS/400, UNIX, VM/CMS, VSE/ESA, Windows).


Das REXX-Lexikon behandelt samtliche Begriffe, Anweisungen und Funktionen, die fur die Betriebssysteme PC-DOS, OS/2 und MVS/TSO von Bedeutung sind....

cena: 722,18

 Complex Networks: An Algorithmic Perspective Kayhan Erciyes 9781138033894 CRC Press
Complex Networks: An Algorithmic Perspective

ISBN: 9781138033894 / Angielski / Miękka / 320 str.

ISBN: 9781138033894/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kayhan Erciyes

Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering. A key issue in the study of complex networks is to understand the collective behavior of the various elements of these networks.
Although the results from graph theory have proven to be powerful in investigating the structures of complex networks, few books focus on the algorithmic aspects of complex network analysis. Filling this need, Complex Networks: An Algorithmic Perspective supplies the basic theoretical algorithmic and graph theoretic...

Network science is a rapidly emerging field of study that encompasses mathematics, computer science, physics, and engineering. A key issue in the s...

cena: 244,84

 Android 6 Programming: Android Studio Development Guide Mark Smart 9781539380054 Createspace Independent Publishing Platform
Android 6 Programming: Android Studio Development Guide

ISBN: 9781539380054 / Angielski / Miękka / 76 str.

ISBN: 9781539380054/Angielski/Miękka/76 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Smart
This is a guide to Android application developers on how to use Android Studio 6 to develop their apps. The first part is a guide on how to use the Code Editor in Android 6. The Code Editor provides programmers with an environment in which they can write their code, and perform some editing to it. The various features and functionalities provided by the Code Editor are discussed. Auto completion, which helps you to avoid too much typing, is also discussed, and you will learn how to enjoy using this feature. You will also learn how to split the Code Editor window so as to get various panels....
This is a guide to Android application developers on how to use Android Studio 6 to develop their apps. The first part is a guide on how to use the Co...
cena: 33,90

 Kubernetes Management Design Patterns: With Docker, Coreos Linux, and Other Platforms Vohra, Deepak 9781484225974 Apress
Kubernetes Management Design Patterns: With Docker, Coreos Linux, and Other Platforms

ISBN: 9781484225974 / Angielski / Miękka / 399 str.

ISBN: 9781484225974/Angielski/Miękka/399 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Deepak Vohra
Take container cluster management to the next level; learn how to administer and configure Kubernetes on CoreOS; and apply suitable management design patterns such as Configmaps, Autoscaling, elastic resource usage, and high availability. Some of the other features discussed are logging, scheduling, rolling updates, volumes, service types, and multiple cloud provider zones. The atomic unit of modular container service in Kubernetes is a Pod, which is a group of containers with a common filesystem and networking. The Kubernetes Pod abstraction enables design patterns for containerized...
Take container cluster management to the next level; learn how to administer and configure Kubernetes on CoreOS; and apply suitable management design ...
cena: 181,11

Pierwsza Podprzednia  55  56  57  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia