Exclusivité web : à partir de 35 euros d’achat, frais de port à 1 centime pour les expéditions vers la France métropolitaine, la Suisse et l’UE avec Colissimo ou GLS
Recherche avancée
Année de parution (72)
Appliquer
Effacer ce filtre
État de parution (8)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Langue (10)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Thème (123)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Support (9)
Appliquer
Inverser les choix
Effacer ce filtre
Plus de filtres
Auteur
Appliquer
Effacer ce filtre
Trier par...
Pertinence
Date de parution
Auteur
Titre
Prix
Recherche sur le thème Informatique :
Nous trouvons 36101 ouvrages correspondant à Informatique
Geriatric Engineering is the science of applying engineering concepts to solve mechanical and control systems deficiencies that arise as people age and aplying these to assistive living...
This book presents methods and devices for measuring power and energy consumption on modern computer systems. It describes how power is consumed on a computer system, and how each component can be...
Novel scalable scientific algorithms are needed to enable key science applications and to exploit the computational power of largescale systems. This is especially true for the current tier of...
The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issues impacting American Police. It examines both the present state of policing...
This book discusses the benefits of creating Aware Networks that are a community of components with identities to support self-organizing networks, self-aware networks, and self-healing networks...
This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ?The TOGAF Foundation...
This handbook provides a comprehensive survey of codes and sequences, ranging from mathematical foundations to applications in various areas and bridging the gap between theory and practice. Each...
Presenting first-order and propositional methods as well as implementation issues, this book provides a state-of-the-art introduction to the automation of logic. It focuses on superposition...
Recent natural disasters, such as Hurricane Sandy and the Washington, D.C., metro?area derecho, revealed vulnerabilities in first responder communication networks and equipment. Agencies in...
This book is intended to be an introductory bioinformatics textbook for mathematicians and computer scientists. It focuses on using algorithms and discrete mathematics to solve biological...
This textbook is a product of the author?s experience teaching software engineering courses and directing student software development projects for 30 years. Often, students have difficulty...
Big data security enables products like Hadoop to provide new knowledge in a secure fashion. Big data brings together many previously separate units of data that were partially secured by their...
This book will assume that the reader has prior rigging knowledge. It will focus on advanced and practical application nof many professsional techniques which are used in high-level character...
Vulkan is a new generation graphics API that provides high-efficiency, cross-platform access to modern GPUs used in a wide variety of devices from PCs and consoles to mobile phones and embedded...
The first major publication on mass fatality management when it was published in 1999, the new edition of this bestseller is greatly revised and expanded. Eight new chapters include such topics as...
This book examines the safety and security of event planning, from small and mid-sized events to large scale events requiring cross-jurisdictional and, potentially, national authority involvement...
Animals are just as much a part of animation as they ever were, but many of today?s artists, stuck inside wrestling with software, miss out on the real-world interaction necessary to properly...
This book introduces the time domain numerical methods to solve electromagnetic problems, including finite-difference time-domain (FDTD) method, the finite element method (FEM) and method of...
Opportunistic networks forms one of the two major categories of multi-hop ad hoc networks, which are widely used in many scenarios. Applications on opportunistic networks have been on mobile...
This book is an introductory text to privacy and traffic analysis, a very important aspect of network security. The target audience for the first edition would be advanced undergraduates reading...