• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

7,534
2,292
2,187
2,074
1,561

COUNTRY

1,042
753
352
338
282

CATEGORIES

  • 1,666
  • 1,632
  • 1,090
  • 2,144
  • 639
  • 1,332
  • 742
  • 382
  • 755

PRICE

9,585
12,200
15,566
20,886

PUBLISHED

943
1,507
5,092
20,886

PRODUCT TYPE

14,391
4,134
1,869
156
137
129
62
3
3
1
1

Computing and Technology

Track the latest developments in the fastest growing sector of the economy. Browse Research and Market’s Computing and Technology category for information resources on the theory and practice of computer science, information technology and/or computer engineering, both from a technical and a business point of view. Our listings include market data, prospects, company profiles and rankings, end-user trends, manuals, step-by-step guides, and courses.

The hardware section focuses on market volumes and forecasts, information on vendors and manufacturers of both final products and of semiconductors, circuits and materials. The Software section covers programming, applications, leading software development companies, cloud computing, and much more.

If you’re concerned about the storage of your precious data, don’t take any risks: browse this sub-category for up-to-date publications covering data centres, disk storage, server room co-location, data warehousing, and back up. A wide range of publications on nanotechnology is also featured. Show Less
Read more

PRODUCT TITLE
GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) - Product Thumbnail Image

GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October)

Where: Chicago, IL (Venue to be announced shortly) When: October 16-17, 2014 Course Description: Quality control and related contract laboratories are considered at high risk because after testing and...

October 2014
Introduction to Light Trapping in Solar Cell and Photo-detector Devices Introduction to Light Trapping in Solar Cell and Photo-detector Devices - Product Thumbnail Image

Introduction to Light Trapping in Solar Cell and Photo-detector Devices

New Approaches to Light Trapping in Solar Cell Devices discusses in detail the use of photonic and plasmonic effects for light trapping in solar cells. It compares and contrasts texturing, the current...

October 2014
Detecting and Combating Malicious Email Detecting and Combating Malicious Email - Product Thumbnail Image

Detecting and Combating Malicious Email

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity...

October 2014
Shape Memory Alloy Engineering Shape Memory Alloy Engineering - Product Thumbnail Image

Shape Memory Alloy Engineering

Shape Memory Alloy Engineering introduces materials, mechanical, and aerospace engineers to shape memory alloys (SMAs), providing a unique perspective that combines fundamental theory with new approaches...

October 2014
Writing Successful UX Proposals Writing Successful UX Proposals - Product Thumbnail Image

Writing Successful UX Proposals

Bringing new project funding and business opportunities to your organization is a vital part of UX professionals' growth and success. Writing Successful UX Proposals teaches the proven techniques for...

September 2014
Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Product Thumbnail Image

Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London)

The Patent Protection for Software course will take place on the 25 September 2014 at The Rembrandt Hotel, London TOPICS TO BE COVERED AT THIS SEMINAR INCLUDE: - Developments in Europe for Computer-Related...

September 2014
Online Security for the Business Traveler Online Security for the Business Traveler - Product Thumbnail Image

Online Security for the Business Traveler

Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic...

September 2014
Combinatorial Designs: With Applications to Coding Theory and Cryptography Combinatorial Designs: With Applications to Coding Theory and Cryptography - Product Thumbnail Image

Combinatorial Designs: With Applications to Coding Theory and Cryptography

This book indends to cover an area of great current interest, namely the interplay between combinatorics, coding theory, and cryptography This is a rich field with high relevance for information theory...

September 2014
FROM

Text Mining of Web-based Medical Content

Text Mining of Web-Based Medical Content examines web mining for extracting useful information that can be used for treating and monitoring the healthcare of patients This work provides methodological...

September 2014
FROM
Embedded C Programming Embedded C Programming - Product Thumbnail Image

Embedded C Programming

This book provides a hands-on introductory course on concepts of C programming using a PIC® microcontroller and CCS C compiler. Through a project-based approach, this book provides an easy to understand...

September 2014
Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August) Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August) - Product Thumbnail Image

Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (August)

Where: DoubleTree San Diego Downtown 1646 Front Street, San Diego, California, 92101, USA When: July 31- August 01, 2014 Course Description: Significant changes in the regulations and industry standards...

August 2014
Bitemporal Data Bitemporal Data - Product Thumbnail Image

Bitemporal Data

Bitemporal data is coming, and major database management systems are beginning to support it. You need to know what is going on "under the hood" and this book that will make you the expert on bitemporal...

August 2014
Time and Relational Theory. Edition No. 2. The Morgan Kaufmann Series in Data Management Systems Time and Relational Theory. Edition No. 2. The Morgan Kaufmann Series in Data Management Systems - Product Thumbnail Image

Time and Relational Theory. Edition No. 2. The Morgan Kaufmann Series in Data Management Systems

Time and Relational Theory provides an in-depth description of temporal database systems, which provide special facilities for storing, querying, and updating historical and future data. Traditionally,...

August 2014
Building an Information Security Awareness Program Building an Information Security Awareness Program - Product Thumbnail Image

Building an Information Security Awareness Program

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's...

August 2014
Encyclopedia of Meat Sciences. Edition No. 2 Encyclopedia of Meat Sciences. Edition No. 2 - Product Thumbnail Image

Encyclopedia of Meat Sciences. Edition No. 2

The Encyclopedia of Meat Sciences, Second Edition, prepared by an international team of experts, is a reference work that covers all important aspects of meat science from stable to table. Its topics...

August 2014
Securing Mobile Ad Hoc Networks Securing Mobile Ad Hoc Networks - Product Thumbnail Image

Securing Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are formed by a group of mbile nodes connected by using wireless networks without the need of a fixed infrastructure. The devices on the MANET can communicate with each...

August 2014
Cloud Networking Cloud Networking - Product Thumbnail Image

Cloud Networking

Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud...

August 2014
Bridging UX and Web Development Bridging UX and Web Development - Product Thumbnail Image

Bridging UX and Web Development

The divide between UX and Web development can be stifling. Bridging UX and Web Development prepares you to break down those walls by teaching you how to integrate with your team's developers. You examine...

August 2014
Advances in Computers, Vol 94 Advances in Computers, Vol 94 - Product Thumbnail Image

Advances in Computers, Vol 94

Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors...

August 2014
Renewable Energy Integration Renewable Energy Integration - Product Thumbnail Image

Renewable Energy Integration

Renewable Energy Integration is a ground-breaking new resource, the first to offer a distilled examination of the intricacies of integrating renewables into the power grid and electricity markets. It...

August 2014
Loading Indicator

Our Clients

Our clients' logos