Зарубежная компьютерная литература

Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation - Kostadinov Todor Pavlov
Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation
Kostadinov Todor Pavlov
Public Key Cryptography. Applications and Attacks - Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
Energy Security. An Interdisciplinary Approach - Gawdat  Bahgat
Energy Security. An Interdisciplinary Approach
Gawdat Bahgat
Reversible Computing. Fundamentals, Quantum Computing, and Applications - Alexis Vos De
Reversible Computing. Fundamentals, Quantum Computing, and Applications
Alexis Vos De
Biomolecular Networks - Luonan Chen
Biomolecular Networks
Luonan Chen
Information Security. Principles and Practice - Mark  Stamp
Information Security. Principles and Practice
Mark Stamp
Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies - Granino Korn A.
Advanced Dynamic-System Simulation. Model Replication and Monte Carlo Studies
Granino Korn A.
Computing Networks - Pascale Vicat-Blanc
Computing Networks
Pascale Vicat-Blanc
System Design for Telecommunication Gateways - Alexander  Bachmutsky
System Design for Telecommunication Gateways
Alexander Bachmutsky
Software Metrics and Software Metrology - Alain  Abran
Software Metrics and Software Metrology
Alain Abran
Electronic Health Record - Pradeep K. Sinha
Electronic Health Record
Pradeep K. Sinha
Stories that Move Mountains - Martin Sykes
Stories that Move Mountains
Martin Sykes
Advanced Internet Protocols, Services, and Applications - Christian Vogt
Advanced Internet Protocols, Services, and Applications
Christian Vogt
Cyber Security Policy Guidebook - Jennifer L. Bayuk
Cyber Security Policy Guidebook
Jennifer L. Bayuk
Android Hacker's Handbook - Zach  Lanier
Android Hacker's Handbook
Zach Lanier
Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data - EMC Services Education
Data Science and Big Data Analytics. Discovering, Analyzing, Visualizing and Presenting Data
EMC Services Education
The Network Security Test Lab - Michael Gregg
The Network Security Test Lab
Michael Gregg
The Art of War in the Network Age - Joseph Henrotin
The Art of War in the Network Age
Joseph Henrotin
Interactions on Digital Tablets in the Context of 3D Geometry Learning - David Bertolo
Interactions on Digital Tablets in the Context of 3D Geometry Learning
David Bertolo
Network Attacks and Exploitation - Matthew Monte
Network Attacks and Exploitation
Matthew Monte
Artificial Immune System - Ying Tan
Artificial Immune System
Ying Tan
Threat Modeling - Adam Shostack
Threat Modeling
Adam Shostack
Cyber-Risk Informatics - Mehmet Sahinoglu
Cyber-Risk Informatics
Mehmet Sahinoglu
Content Delivery Networks - Dom Robinson
Content Delivery Networks
Dom Robinson
The Image-Interface - Everardo Reyes-Garcia
The Image-Interface
Everardo Reyes-Garcia
Linux Server Security - Chris Binnie
Linux Server Security
Chris Binnie
Computing Fundamentals - Faithe Wempen
Computing Fundamentals
Faithe Wempen
ERP and Information Systems - Tarek Samara
ERP and Information Systems
Tarek Samara
Cybersecurity - Thomas J. Mowbray
Cybersecurity
Thomas J. Mowbray
Network Reliability - Sanjay Kumar Chaturvedi
Network Reliability
Sanjay Kumar Chaturvedi
Transformation of Collective Intelligences - Jean-Max Noyer
Transformation of Collective Intelligences
Jean-Max Noyer
Security Management of Next Generation Telecommunications Networks and Services - Stuart Jacobs
Security Management of Next Generation Telecommunications Networks and Services
Stuart Jacobs
Collaborative Annotation for Reliable Natural Language Processing - Karën Fort
Collaborative Annotation for Reliable Natural Language Processing
Karën Fort
Knowledge Needs and Information Extraction - Nicolas Turenne
Knowledge Needs and Information Extraction
Nicolas Turenne
WHOIS Running the Internet - Garth O. Bruen
WHOIS Running the Internet
Garth O. Bruen
E-mail and Behavioral Changes - Fernando Lagrana
E-mail and Behavioral Changes
Fernando Lagrana
Fiber Optics Installer (FOI) Certification Exam Guide - Bill Woodward
Fiber Optics Installer (FOI) Certification Exam Guide
Bill Woodward
Versatile Routing and Services with BGP - Colin Bookham
Versatile Routing and Services with BGP
Colin Bookham
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks - Ken Chen
Performance Evaluation by Simulation and Analysis with Applications to Computer Networks
Ken Chen
Decision-Making and the Information System - Maryse Salles
Decision-Making and the Information System
Maryse Salles