20677 rezultatov
-
Cryptanalysis(2000) GAINES, HELEN FOUCHEThorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Simple and advanced methods. 166 specimens to solve — with solutions.Vezava: Mehka18,91 €
-
Law of Consumer Redress in an Evolving Digital Market(2017) CORTES, PABLO (UNIVERSITY OF LEICESTER)Examining the recent legal changes in consumer dispute resolution methods, this book focuses on alternative dispute resolution methods such as ombudsman and mediation schemes, and also explores other consumer redress procedures including public enforcemenVezava: Trda176,72 €
-
Game Audio Programming 2(2022)This is Volume 2 in a sequential series of bi-annual volumes, with each volume comprised of 20-30 chapters written by game audio programmers and sound designers. Basic to advanced knowledge of programming and audio integration techniques is presented.Vezava: Mehka82,24 €
-
TouchIT(2022) DIX, ALAN (PROFESSOR AND DIRECTOR AND DIRECTOR, PROFESSOR AND DIRECTOR AND DIRECTOR, COMPUTATIONAL FOUNDRY, COMPUTER SCIENCE SWANSEA UNIVERSITY, WALES, UK),GILL, STEVE (PROFESSOR AND DEPUTY DIRECTOR OF RESEARCH & GRADUATE STUDIES, PROFESSOR AND DEPUTY DIRECTOR OF RESEARCH & GRADUATE STUDIES, CARDIFF SCHOOL OF ART AND DESIGN, CARDIFF METROPOLITAN UNIVERSITY, WALES, UK),RAMDUNY-ELLIS, DEVINA (DIRECTOR OF EDUCATION AND HEAD OF COMPUTER SCIENCE, DIRECTOR OF EDUCATION AND HEAD OF COMPUTER SCIENCE, HUDDERSFIELD GRAMMAR SCHOOL, UK),HARE, JO (SENIOR LECTURER, SENIOR LECTURER, FET- ARCHITECTURE AND THE BUILT ENVIRONMENT, UNIVERSITY OF THE WEST OF ENGLAND, UK)TouchIT brings together insights from human-computer interaction and industrial design, exploring these themes under four main headings: human body and mind; objects and things; space; and information and computation.Vezava: Trda74,35 €
-
Relational Database Design and Implementation(2016) HARRINGTON, JAN L. (PROFESSOR AND DEPARTMENT CHAIR, COMPUTER SCIENCE, MARIST COLLEGE, HYDE PARK, NY, USA)Vezava: Mehka77,10 €
-
Data Mining(2016) WITTEN, IAN H. (COMPUTER SCIENCE DEPARTMENT, UNIVERSITY OF WAIKATO, NEW ZEALAND),FRANK, EIBE (COMPUTER SCIENCE DEPARTMENT, UNIVERSITY OF WAIKATO, NEW ZEALAND),HALL, MARK A. (COMPUTER SCIENCE DEPARTMENT, UNIVERSITY OF WAIKATO, NEW ZEALAND),PAL, CHRISTOPHER J. (DEPARTMENT OF COMPUTER ENGINEERING AND SOFTWARE ENGINEERING, POLYTECHNIQUE MONTREAL, QUEBEC, CANADA)Vezava: Mehka93,83 €
-
Google Hacking for Penetration Testers(2015) GARDNER, BILL (BILL GARDNER OSCP, I-NET+, SECURITY+, ASST. PROF. AT MARSHALL UNIVERSITY),LONG, JOHNNY (SECURITY RESEARCHER, FOUNDER OF HACKERS FOR CHARITY),BROWN, JUSTIN (INFORMATION SECURITY PROFESSIONAL AT ONE WORLDS LAB)Vezava: Mehka77,10 €
-
Quantifying the User Experience(2016) SAURO, JEFF (USABILITY METRICS AND STATISTICAL ANALYST, MEASURING USABILITY LLC, CO, USA),LEWIS, JAMES R (SENIOR HUMAN FACTORS ENGINEER, IBM, FL, USA)Vezava: Mehka70,53 €
-
Agile Systems Engineering(2015) DOUGLASS, BRUCE POWEL, PH.D. (CHIEF EVANGELIST, IBM INTERNET OF THINGS, FAIRFAX, VA, USA)Vezava: Mehka90,22 €
-
Multi-Domain Master Data Management(2015) ALLEN, MARK (MANAGER, ENTERPRISE DATA GOVERNANCE, WELLPOINT, INC., COLORADO, USA.),CERVO, DALTON (FOUNDER OF DATA GAP CONSULTING, COLORADO, USA.)Vezava: Mehka65,92 €
-
Machine Learning Fundamentals(2021) JIANG, HUI (YORK UNIVERSITY, TORONTO)This lucid and coherent introduction to supervised machine learning presents core concepts in a concise, logical and easy-to-follow way for readers with some mathematical preparation but no prior exposure to machine learning. Coverage includes widely usedVezava: Mehka78,75 €
-
Adobe Creative Cloud All-in-One For Dummies(2021) SMITH, JENNIFER,SMITH, CHRISTOPHERVezava: Mehka46,25 €
-
Applied Network Security Monitoring(2014) SANDERS, CHRIS (SENIOR INFORMATION SECURITY ANALYST AT THE DOD, TRAINER, AND AUTHOR),SMITH, JASONA guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how toVezava: Mehka71,27 €
-
Understanding Your Users(2015) BAXTER, KATHY (ARCHITECT, ETHICAL AI PRACTICE, SALESFORCE, CA),COURAGE, CATHERINE (VP, ADS & COMMERCE USER EXPERIENCE, GOOGLE),CAINE, KELLY (ASSOCIATE PROFESSOR, CLEMSON UNIVERSITY, CLEMSON, SC, USA)Vezava: Mehka77,10 €
-
Measuring and Managing Information Risk(2014) FREUND, JACK (VP, HEAD OF CYBER RISK METHODOLOGY FOR BITSIGHT, US),JONES, JACK (CO-FOUNDER AND PRESIDENT OF CXOWARE, INC., US)Vezava: Mehka71,27 €
-
Basics of Hacking and Penetration Testing(2013) ENGEBRETSON, PATRICK (DAKOTA STATE UNIVERSITY, MADISON, SD USA)Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetratiVezava: Mehka34,20 €
-
Business Intelligence Guidebook(2014) SHERMAN, RICK (FOUNDER, ATHENA IT SOLUTIONS)Vezava: Mehka70,53 €
-
Computer Animation(2012) PARENT, RICK (PROFESSOR EMERITUS, DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING, THE OHIO STATE)Driven by demand from the entertainment industry for better and more realistic animation, technology continues to evolve and improve. This title includes the algorithms and techniques behind this technology. It covers such topics as fluids, hair, and crowVezava: Trda83,66 €