Ranez.Ru |  
НГПУ
Факультет Иностранных Языков

Books in English

Books in French

Books in German

Books in Italian

Books in Spanish

Изучение языков мира

 

Книги. Художественная литература. Учебники и пособия.

OZON.ru - Онлайн мегамаркет № 1

В этом разделе вы можете найти различные книги: художественную литературу и беллетристику на иностранных языках, пособия и методички, учебную и справочную литературу по изучающему языку. К вашему вниманию художественная литература на немецком и английском языке. Словари и энциклопедии. А понравившиеся издания вы можете заказать с доставкой.


Books in English / Компьютеры и ИТ / Управление проектами

Другие категории данного раздела



Случайная выборка книг из разделов

Practical VoIP Security

2738.00 руб.*

Thomas Porter, Jan Kanclirz Jr.

Practical VoIP Security

Your Hands-On Guide to Voice over IP (VoIP) This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions. VoIP Isn't Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. ...
Secure Communications: Applications and Management

1807.00 руб.*

Roger Sutton

Secure Communications: Applications and Management

If you need to know more about communication's security management, this is the perfect book for you... Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments. Explains the practical links between cryptographyand telecommunications Addresses the pertinent issues of implementation of cryptography as a method of protecting information Supports each communications technology and the fundamentals of cryptography with useful and...
Careers in E-Commerce Security and Encryption (Library of E-Commerce and Internet Careers)

834.00 руб.*

Chris Hayhurst

Careers in E-Commerce Security and Encryption (Library of E-Commerce and Internet Careers)

Financial Engineering and Computation: Principles, Mathematics, and Algorithms

7174.00 руб.*

Yuh-Dauh Lyuu

Financial Engineering and Computation: Principles, Mathematics, and Algorithms

Nowadays students and professionals intending to work in any area of finance must master not only advanced concepts and mathematical models but also learn how to implement these models computationally. This comprehensive text combines the theory and mathematics behind financial engineering with an emphasis on computation, in keeping with the way financial engineering is practiced in today's capital markets. Unlike most books on investments, financial engineering, or derivative securities, the book startsfrom very basic ideas in finance and gradually builds up the theory. It offers a thorough grounding in the subject for MBAs in finance, students of engineering and sciences who are pursuing a career in finance, researchers in computational finance, system analysts, and financial engineers. Along with the theory, the author presents numerous algorithms for pricing, risk management, and portfolio management. The emphasis is on pricing financial and derivative securities: bonds,...
Computer System and Network Security

2868.00 руб.*

Udo W. Pooch

Computer System and Network Security

Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference. Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage...
Managing High-Intensity Internet Projects

4362.00 руб.*

Edward Yourdon

Managing High-Intensity Internet Projects

A rapid-fire guide to managing high-intensity software projects. Yourdon delivers instant, practical solutions for key challenges associated with Internet development. Softcover.
Steganography

1019.00 руб.*

Karen Bailey, Kevin Curran

Steganography

Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used for example by civil rights organizations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to read the message as cryptography does, it is to hide the existence of the message in the first place possibly to protect the courier. The aim of this book is to investigate the background of steganography, discuss steganographic tools in common use and methods commonly implemented. The theory is also enhanced with a series of documented steganography java classes which implement many of the...
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

2933.00 руб.*

Naganand Doraswamy, Dan Harkins

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

Spreadsheet Tools for Engineers: Excel '97 Version (B.E.S.T. Series)

15342.00 руб.*

Byron Gottfried

Spreadsheet Tools for Engineers: Excel '97 Version (B.E.S.T. Series)

B.E.S.T. (Basic Engineering Series and Tools) consists of modularized textbooks offering virtually every topic and specialty likely to be covered in an introductory engineering course. All the texts boast distinguished authors and the most current content. These inexpensive BEST modules are easily combined with each other to construct the ideal Intro to Engineering course. The goal of this series is to provide the educational community with material that is timely, affordable, of high quality, and flexible in how it is used.
ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations

2935.00 руб.*

Timothy D. Casey

ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations

It's a jungle out there, (in ISP LiabilityLand) but your capable jungle guide, Tim Casey, takes you safely and firmly into and out of what would otherwise be very complex and potentially dangerous territory. Bring a camera.-Vinton Cerf Governments around the world are establishing laws and regulations that will have a great impact on the way Internet Service Providers (ISPs) do business. With existing and ongoing efforts to regulate the Internet, ISPs are in desperate need of expert guidanceto sort out which laws apply to them. This is precisely what author Timothy Casey offers in his new book. As the preeminent technical legal counsel for MCI WorldCom and one of the framers of the Digital Millennium Copyright Act, Casey shows you how to protect yourself in this volatile market. This valuable guide gives you: * Detailed explanations on the varying laws and how their technical features impact running a liability-free ISP * Critical considerations...


Books in English / Компьютеры и ИТ / Управление проектами

 

 

* Указанная цена за книгу может отличаться от той, по которой продается она в онлайн-магазине Ozon.ru, партнером которого является Ranez.Ru. Администрация сайта Ranez.Ru ни коим образом не гарантирует ни цену, ни наличие этой книги на складе у продавца, равно как и возможность ее купить. На сайте Ranez.Ru представлена только информация о книге, оформление покупки, оплата и вопросы с доставкой решаются на сайте онлайн-магазина Ozon.ru.
 

Новые материалы

2013, Май 23
2013, Февраль 24
2012, Ноябрь 04
2012, Октябрь 11
2011, Декабрь 27
2011, Декабрь 02
2011, Ноябрь 01
2011, Октябрь 23
2011, Август 09
Все поступления

Популярное в этом месяце

Популярные статьи

Ответы на Форуме

Последние обсуждения

Понравился сайт?!

Размести ссылку на эту страницу у себя в блоге:)

 
Данный интернет-сайт носит исключительно информационный характер, и ни при каких условиях информационные материалы и цены, размещенные на сайте, не являются публичной офертой, определяемой положениями Статьи 437 ГК РФ.