MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Searches
Related Articles

6 228 products in Computers & Internet

Advertisement

Protect your organisation by building a security-minded culture With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a
📱 Networking
In this volume, which was originally published in 1996, noisy information is studied in the context of computational complexity; in other words the text deals with the computational complexity of mathematical problems
📱 Databases
The emergence in recent years of a knowledge-based economy, and the seismic, structural changes it has wrought in the advanced economies, have been the subject of intense debate in economics. This volume
📱 Software
20% OFF
The diversity of methodologies and applications in the literature for the traffic engineering, performance modelling and analysis of convergent multiservice heterogeneous networks attests to the breath and richness of recent research and
📱 Networking
30,000 entries in each language cover terminology used in telecommunications, electronics and computer science, and developments in related disicplines. This book should be of interest to technical translators and interpreters, telecommunications hardware
38% OFF
As computers become more widely used in schools, it is clear that they have the potential to redefine the scope of the language curriculum. But for this potential to be realized they
📱 Software
20% OFF
Over the recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the performance modelling, evaluation and prediction of convergent multi-service heterogeneous networks, such as wireless
📱 Networking
This collection of articles by well-known experts was originally published in 2000 and is intended for researchers in computer science, practitioners of formal methods, and computer programmers working in safety-critical applications or
21% OFF
Implement a Hyper-V virtualization solution Microsoft Virtualization with Hyper-V shows you how to deploy Microsoft's next-generation hypervisor-based server virtualization technology in a corporate environment. You'll get step-by-step guidelines for getting Hyper-V up
📱 Networking
This text presents an account of the development and future possibilities of digital media. Tony Feldman addresses fundamental questions about digital media and its potential use in our everyday lives. What is
📱 Software
9% OFF
As real-time and integrated systems become increasingly sophisticated, issues related to development life cycles, non-recurring engineering costs, and poor synergy between development teams will arise. The Handbook of Research on Embedded Systems
📱 Software
Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can
📱 Networking
A Functional Start to Computing with Python enables students to quickly learn computing without having to use loops, variables, and object abstractions at the start. Requiring no prior programming experience, the book
📱 Programming
Providing a comprehensive set of business models for an e-business, this book enables IT managers and directors to develop and implement IT strategies and infrastructures for new models of doing business based
📱 Networking
Linda Morrison brings the voices and issues of a little-known, complex social movement to the attention of sociologists, mental health professionals, and the general public. The members of this social movement work
📱 Networking
The ERP implementation cycle is characterized by complexity, uncertainty and a long time-scale. It is about people and issues that affect the business - it is a multi-disciplinary effort. This book will
This book presents the reader with new operators and matrices that arise in the area of matrix calculus. The properties of these mathematical concepts are investigated and linked with zero-one matrices such
📱 Software
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus
With the advent of the National Curriculum, computer based modelling (CBM) is now a compulsory part of the school curriculum. Teachers are increasingly being encouraged to seek out opportunities for CBM in
📱 Software

Popular Searches in Computers & Internet

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.