• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

7,568
2,318
2,192
2,081
1,565

COUNTRY

1,062
755
353
339
283

CATEGORIES

  • 1,667
  • 1,633
  • 1,091
  • 2,158
  • 639
  • 1,332
  • 742
  • 383
  • 755

PRICE

9,632
12,254
15,627
20,953

PUBLISHED

1,010
1,519
5,124
20,953

PRODUCT TYPE

14,394
4,134
1,930
156
137
129
62
6
3
1
1

Computing and Technology

Track the latest developments in the fastest growing sector of the economy. Browse Research and Market’s Computing and Technology category for information resources on the theory and practice of computer science, information technology and/or computer engineering, both from a technical and a business point of view. Our listings include market data, prospects, company profiles and rankings, end-user trends, manuals, step-by-step guides, and courses.

The hardware section focuses on market volumes and forecasts, information on vendors and manufacturers of both final products and of semiconductors, circuits and materials. The Software section covers programming, applications, leading software development companies, cloud computing, and much more.

If you’re concerned about the storage of your precious data, don’t take any risks: browse this sub-category for up-to-date publications covering data centres, disk storage, server room co-location, data warehousing, and back up. A wide range of publications on nanotechnology is also featured. Show Less
Read more

PRODUCT TITLE
Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October) Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October) - Product Thumbnail Image

Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October)

Where: Philadelphia, PA (Venue to be announced shortly) When: October 23-24, 2014 Course Description: Significant changes in the regulations and industry standards for software validation are detailed...

October 2014

Analytical Instrument Qualification and System Validation: 2- day In-person Seminar (October)

Where: Chicago, IL(Venue to be announced shortly) When: October 20-21, 2014 Course Description: Analytical instruments should be qualified and systems should be validated to demonstrate suitability...

October 2014
GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) - Product Thumbnail Image

GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October)

Where: Chicago, IL (Venue to be announced shortly) When: October 16-17, 2014 Course Description: Quality control and related contract laboratories are considered at high risk because after testing and...

October 2014
Introduction to Light Trapping in Solar Cell and Photo-detector Devices Introduction to Light Trapping in Solar Cell and Photo-detector Devices - Product Thumbnail Image

Introduction to Light Trapping in Solar Cell and Photo-detector Devices

New Approaches to Light Trapping in Solar Cell Devices discusses in detail the use of photonic and plasmonic effects for light trapping in solar cells. It compares and contrasts texturing, the current...

October 2014
Detecting and Combating Malicious Email Detecting and Combating Malicious Email - Product Thumbnail Image

Detecting and Combating Malicious Email

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity...

October 2014
Shape Memory Alloy Engineering Shape Memory Alloy Engineering - Product Thumbnail Image

Shape Memory Alloy Engineering

Shape Memory Alloy Engineering introduces materials, mechanical, and aerospace engineers to shape memory alloys (SMAs), providing a unique perspective that combines fundamental theory with new approaches...

October 2014
Writing Successful UX Proposals Writing Successful UX Proposals - Product Thumbnail Image

Writing Successful UX Proposals

Bringing new project funding and business opportunities to your organization is a vital part of UX professionals' growth and success. Writing Successful UX Proposals teaches the proven techniques for...

September 2014
Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Product Thumbnail Image

Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London)

The Patent Protection for Software course will take place on the 25 September 2014 at The Rembrandt Hotel, London TOPICS TO BE COVERED AT THIS SEMINAR INCLUDE: - Developments in Europe for Computer-Related...

September 2014
Online Security for the Business Traveler Online Security for the Business Traveler - Product Thumbnail Image

Online Security for the Business Traveler

Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic...

September 2014
Combinatorial Designs: With Applications to Coding Theory and Cryptography Combinatorial Designs: With Applications to Coding Theory and Cryptography - Product Thumbnail Image

Combinatorial Designs: With Applications to Coding Theory and Cryptography

This book indends to cover an area of great current interest, namely the interplay between combinatorics, coding theory, and cryptography This is a rich field with high relevance for information theory...

September 2014
FROM

Text Mining of Web-based Medical Content

Text Mining of Web-Based Medical Content examines web mining for extracting useful information that can be used for treating and monitoring the healthcare of patients This work provides methodological...

September 2014
FROM
Embedded C Programming Embedded C Programming - Product Thumbnail Image

Embedded C Programming

This book provides a hands-on introductory course on concepts of C programming using a PIC® microcontroller and CCS C compiler. Through a project-based approach, this book provides an easy to understand...

September 2014
Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August) Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August) - Product Thumbnail Image

Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August)

Where: DoubleTree San Diego Downtown 1646 Front Street, San Diego, California, 92101, USA When: July 31- August 01, 2014 Course Description: Significant changes in the regulations and industry standards...

August 2014

21 CFR Part 11 Compliance for SaaS/Cloud Applications: 2-day In-person Seminar

Where: Seattle, WA (Venue to be announced shortly) When: August 21-22, 2014 Course Description: Significant changes in the regulations and industry standards for software validation are detailed in...

August 2014
Bitemporal Data Bitemporal Data - Product Thumbnail Image

Bitemporal Data

Bitemporal data is coming, and major database management systems are beginning to support it. You need to know what is going on "under the hood" and this book that will make you the expert on bitemporal...

August 2014
Time and Relational Theory. Edition No. 2. The Morgan Kaufmann Series in Data Management Systems Time and Relational Theory. Edition No. 2. The Morgan Kaufmann Series in Data Management Systems - Product Thumbnail Image

Time and Relational Theory. Edition No. 2. The Morgan Kaufmann Series in Data Management Systems

Time and Relational Theory provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally,...

August 2014
Building an Information Security Awareness Program Building an Information Security Awareness Program - Product Thumbnail Image

Building an Information Security Awareness Program

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's...

August 2014
Encyclopedia of Meat Sciences. Edition No. 2 Encyclopedia of Meat Sciences. Edition No. 2 - Product Thumbnail Image

Encyclopedia of Meat Sciences. Edition No. 2

The Encyclopedia of Meat Sciences, Second Edition, prepared by an international team of experts, is a reference work that covers all important aspects of meat science from stable to table. Its topics...

August 2014
Securing Mobile Ad Hoc Networks Securing Mobile Ad Hoc Networks - Product Thumbnail Image

Securing Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are formed by a group of mbile nodes connected by using wireless networks without the need of a fixed infrastructure. The devices on the MANET can communicate with each...

August 2014
Cloud Networking Cloud Networking - Product Thumbnail Image

Cloud Networking

Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud...

August 2014
Loading Indicator

Our Clients

Our clients' logos