• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

7,584
2,317
2,197
2,081
1,565

COUNTRY

1,060
758
354
339
283

CATEGORIES

  • 1,668
  • 1,634
  • 1,094
  • 2,170
  • 642
  • 1,335
  • 742
  • 384
  • 755

PRICE

9,705
12,296
15,643
20,980

PUBLISHED

701
1,503
4,804
20,980

PRODUCT TYPE

14,419
4,135
1,930
156
137
129
62
7
3
1
1

Computing and Technology

Track the latest developments in the fastest growing sector of the economy. Browse Research and Market’s Computing and Technology category for information resources on the theory and practice of computer science, information technology and/or computer engineering, both from a technical and a business point of view. Our listings include market data, prospects, company profiles and rankings, end-user trends, manuals, step-by-step guides, and courses.

The hardware section focuses on market volumes and forecasts, information on vendors and manufacturers of both final products and of semiconductors, circuits and materials. The Software section covers programming, applications, leading software development companies, cloud computing, and much more.

If you’re concerned about the storage of your precious data, don’t take any risks: browse this sub-category for up-to-date publications covering data centres, disk storage, server room co-location, data warehousing, and back up. A wide range of publications on nanotechnology is also featured. Show Less
Read more

PRODUCT TITLE
Bandwidth Needs Analysis of the RBOCs' Advanced Access Architectures: FTTP and FTTN Bandwidth Needs Analysis of the RBOCs' Advanced Access Architectures: FTTP and FTTN - Product Thumbnail Image

Bandwidth Needs Analysis of the RBOCs' Advanced Access Architectures: FTTP and FTTN

The Advanced Access Architecture thrusts of the major US carriers as one of the most important events in telecommunications history As such, the authors have been periodically issuing major reports...

October 2014
FROM

Google Earth Forensics

Google Earth Forensics is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based...

October 2014
Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October) Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October) - Product Thumbnail Image

Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October)

Where: Philadelphia, PA (Venue to be announced shortly) When: October 23-24, 2014 Course Description: Significant changes in the regulations and industry standards for software validation are detailed...

October 2014

Analytical Instrument Qualification and System Validation: 2- day In-person Seminar (October)

Where: Chicago, IL(Venue to be announced shortly) When: October 20-21, 2014 Course Description: Analytical instruments should be qualified and systems should be validated to demonstrate suitability...

October 2014
GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) - Product Thumbnail Image

GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October)

Where: Chicago, IL (Venue to be announced shortly) When: October 16-17, 2014 Course Description: Quality control and related contract laboratories are considered at high risk because after testing and...

October 2014
Introduction to Light Trapping in Solar Cell and Photo-detector Devices Introduction to Light Trapping in Solar Cell and Photo-detector Devices - Product Thumbnail Image

Introduction to Light Trapping in Solar Cell and Photo-detector Devices

New Approaches to Light Trapping in Solar Cell Devices discusses in detail the use of photonic and plasmonic effects for light trapping in solar cells. It compares and contrasts texturing, the current...

October 2014
Detecting and Combating Malicious Email Detecting and Combating Malicious Email - Product Thumbnail Image

Detecting and Combating Malicious Email

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity...

October 2014
Shape Memory Alloy Engineering Shape Memory Alloy Engineering - Product Thumbnail Image

Shape Memory Alloy Engineering

Shape Memory Alloy Engineering introduces materials, mechanical, and aerospace engineers to shape memory alloys (SMAs), providing a unique perspective that combines fundamental theory with new approaches...

October 2014
Writing Successful UX Proposals Writing Successful UX Proposals - Product Thumbnail Image

Writing Successful UX Proposals

Bringing new project funding and business opportunities to your organization is a vital part of UX professionals' growth and success. Writing Successful UX Proposals teaches the proven techniques for...

September 2014
Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Product Thumbnail Image

Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London)

The Patent Protection for Software course will take place on the 25 September 2014 at The Rembrandt Hotel, London TOPICS TO BE COVERED AT THIS SEMINAR INCLUDE: - Developments in Europe for Computer-Related...

September 2014
Online Security for the Business Traveler Online Security for the Business Traveler - Product Thumbnail Image

Online Security for the Business Traveler

Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic...

September 2014

MEMS: Status of the MEMS Industry 2014

KEY FEATURES OF THE REPORT - Understanding of MEMS markets and applications - Understanding of MEMS players' strategies - Evolution of competitive environment - Analysis of MEMS technology challenges...

September 2014
FROM

3DIC & 2.5D TSV Interconnect for Advanced Packaging - 2014 Business Update

Key features of the report - Through Silicon Vias (TSVs) integration characteristics & industry trends - Wafer start forecast 2013-2019 per application (MEMS, CIS, Memories…) - Wafer start forecast...

September 2014
FROM

Computer System Validation- Reduce Costs and Avoid 483: 2-day In-person Seminar

Where: London, UK (Venue to be announced shortly) When: September 04-05, 2014 Course Description: This interactive two-day course will detail the significant changes in the regulations and industry...

September 2014
Combinatorial Designs: With Applications to Coding Theory and Cryptography Combinatorial Designs: With Applications to Coding Theory and Cryptography - Product Thumbnail Image

Combinatorial Designs: With Applications to Coding Theory and Cryptography

This book indends to cover an area of great current interest, namely the interplay between combinatorics, coding theory, and cryptography This is a rich field with high relevance for information theory...

September 2014
FROM

Text Mining of Web-based Medical Content

Text Mining of Web-Based Medical Content examines web mining for extracting useful information that can be used for treating and monitoring the healthcare of patients This work provides methodological...

September 2014
FROM
Embedded C Programming Embedded C Programming - Product Thumbnail Image

Embedded C Programming

This book provides a hands-on introductory course on concepts of C programming using a PIC® microcontroller and CCS C compiler. Through a project-based approach, this book provides an easy to understand...

September 2014
Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August) Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August) - Product Thumbnail Image

Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August)

Where: DoubleTree San Diego Downtown 1646 Front Street, San Diego, California, 92101, USA When: July 31- August 01, 2014 Course Description: Significant changes in the regulations and industry standards...

August 2014

21 CFR Part 11 Compliance for SaaS/Cloud Applications: 2-day In-person Seminar

Where: Seattle, WA (Venue to be announced shortly) When: August 21-22, 2014 Course Description: Significant changes in the regulations and industry standards for software validation are detailed in...

August 2014
Bitemporal Data Bitemporal Data - Product Thumbnail Image

Bitemporal Data

Bitemporal data is coming, and major database management systems are beginning to support it. You need to know what is going on "under the hood" and this book that will make you the expert on bitemporal...

August 2014
Loading Indicator

Our Clients

Our clients' logos