Книги жанра зарубежная компьютерная литература: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 60
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра зарубежная компьютерная литература

Professional Java User Interfaces
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

This book covers the full development life cycle for professional GUI design in Java, from cost estimation and design to coding and testing. Focuses on building high quality industrial strength software in Java Ready-to-use source code is given throughout the text based on industrial-strength projects undertaken by the author.

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Professional Java User Interfaces
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

This book covers the full development life cycle for professional GUI design in Java, from cost estimation and design to coding and testing. Focuses on building high quality industrial strength software in Java Ready-to-use source code is given throughout the text based on industrial-strength projects undertaken by the author.

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Bioinformatics
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We are all in their debt. —Eric Lander from the Foreword Re…

Добавленo: Рейтинг: 4 Комментариев 0 шт.