• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

5,794
2,395
2,232
2,229
2,111

COUNTRY

1,231
784
377
315
295

CATEGORIES

  • 898
  • 1,446
  • 1,228
  • 2,166
  • 670
  • 1,291
  • 122
  • 1,183
  • 487
  • 218
  • 180

PRICE

9,007
10,906
13,905
19,945

PUBLISHED

702
1,568
4,100
19,945

PRODUCT TYPE

14,336
4,691
251
206
171
161
65
58
3
2
1

Computing and Technology

Track the latest developments in the fastest growing sector of the economy. Browse Research and Market’s Computing and Technology category for information resources on the theory and practice of computer science, information technology and/or computer engineering, both from a technical and a business point of view. Our listings include market data, prospects, company profiles and rankings, end-user trends, manuals, step-by-step guides, and courses.

The hardware section focuses on market volumes and forecasts, information on vendors and manufacturers of both final products and of semiconductors, circuits and materials. The Software section covers programming, applications, leading software development companies, cloud computing, and much more.

If you’re concerned about the storage of your precious data, don’t take any risks: browse this sub-category for up-to-date publications covering data centres, disk storage, server room co-location, data warehousing, and back up. A wide range of publications on nanotechnology is also featured. Show Less
Read more

PRODUCT TITLE
Thor's OS Xodus Thor's OS Xodus - Product Thumbnail Image

Thor's OS Xodus

Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OSX provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that...

July 2015
Ensuring Digital Accessibility through Process and Policy Ensuring Digital Accessibility through Process and Policy - Product Thumbnail Image

Ensuring Digital Accessibility through Process and Policy

Ensuring Accessibility through Process and Policy provides readers with a must-have resource to accessibility, from a technical and policy perspective. Rather than being a step-by-step guide, this book...

July 2015
Agile Data Warehousing for the Enterprise Agile Data Warehousing for the Enterprise - Product Thumbnail Image

Agile Data Warehousing for the Enterprise

You're making progress towards an agile data warehouse and are looking forward to faster results for half the cost. Now it's time to collaborate with IT managers, project managers, and tech leads across...

July 2015
System on Chip Interfaces for Low Power Design System on Chip Interfaces for Low Power Design - Product Thumbnail Image

System on Chip Interfaces for Low Power Design

System on Chip Interfaces for Low Power Design provides a top-down understanding of interfaces available to SoC developers, not only the underlying protocols and architecture of each, but also how they...

July 2015
Breaking into Information Security Breaking into Information Security - Product Thumbnail Image

Breaking into Information Security

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different...

July 2015
Cyber-Physical Attacks Cyber-Physical Attacks - Product Thumbnail Image

Cyber-Physical Attacks

Cyber-Physical Attacks: How They Work and How to Protect Against Them presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make...

July 2015
Operating System Forensics Operating System Forensics - Product Thumbnail Image

Operating System Forensics

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful...

July 2015
Digital Holographic Data Representation and Compression Digital Holographic Data Representation and Compression - Product Thumbnail Image

Digital Holographic Data Representation and Compression

With the increasing interest in holography for 3D imaging applications, there is a need to develop and use hologram compression techniques for the efficient storage and transmission of holographic data....

July 2015
Smart Grid Security Smart Grid Security - Product Thumbnail Image

Smart Grid Security

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has...

July 2015
Learning Processing. Edition No. 2. The Morgan Kaufmann Series in Interactive 3D Technology Learning Processing. Edition No. 2. The Morgan Kaufmann Series in Interactive 3D Technology - Product Thumbnail Image

Learning Processing. Edition No. 2. The Morgan Kaufmann Series in Interactive 3D Technology

This book teaches the basic building blocks of programming needed to create cutting-edge graphics applications including interactive art, live video Processing, and data visualization. A unique lab-style...

June 2015
Security Controls Evaluation, Testing and Assessment Handbook Security Controls Evaluation, Testing and Assessment Handbook - Product Thumbnail Image

Security Controls Evaluation, Testing and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in...

June 2015

5th International Conference on Advances in Engineering & Technology (Kuala Lumpur)

Languages: English, Thai, Bahasa Malaysia, Chinese and Farsi (There will be separate sessions for participants presenting other than English) ICAET Themes The conference themes for ‘Engineering...

June 2015
Connectivity in Medical Technology Connectivity in Medical Technology - Product Thumbnail Image

Connectivity in Medical Technology

We are at the start of an industrial revolution in medical devices. The possibilities for medical devices to wirelessly collect, analyse and disseminate information as well as for controlling the device...

June 2015
Successful User Experience: Strategies and Roadmaps Successful User Experience: Strategies and Roadmaps - Product Thumbnail Image

Successful User Experience: Strategies and Roadmaps

Successful User Experience: Strategy and Roadmaps provides you with a hands-on guide for pulling all of the User Experience (UX) pieces together to create a strategy that includes tactics, tools, and...

June 2015
Online Social Networks:. Computer Science Reviews and Trends Online Social Networks:. Computer Science Reviews and Trends - Product Thumbnail Image

Online Social Networks:. Computer Science Reviews and Trends

Online Social Networks: Human Cognitive Constraints in Facebook and Twitter provides new insights into the structural properties of personal online social networks and the mechanisms underpinning human...

June 2015
Entity Information Life Cycle for Big Data Entity Information Life Cycle for Big Data - Product Thumbnail Image

Entity Information Life Cycle for Big Data

Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This...

June 2015

Digital Design and Computer Architecture

Digital Design and Computer Architecture: ARM Edition takes a unique and modern approach to digital design. Beginning with digital logic gates and progressing to the design of combinational and sequential...

June 2015
FROM
Mobile Data Loss Prevention Mobile Data Loss Prevention - Product Thumbnail Image

Mobile Data Loss Prevention

Current attack vectors indicate that malware, spyware, and other nefarious attacks are targeting mobile devices for financial gain, cyber espionage, or to simply damage company reputation. Additionally,...

June 2015
Python Passive Network Mapping Python Passive Network Mapping - Product Thumbnail Image

Python Passive Network Mapping

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant...

June 2015
Understanding Your Users. Edition No. 2. Interactive Technologies Understanding Your Users. Edition No. 2. Interactive Technologies - Product Thumbnail Image

Understanding Your Users. Edition No. 2. Interactive Technologies

This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method...

June 2015
Loading Indicator

Our Clients

Intel Corporation Autodesk, Inc. Hewlett-Packard Company Ahlstrom Corporation SAP SE 3M Company Samsung Group Ltd.