• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

7,662
2,309
2,223
2,084
1,567

COUNTRY

1,054
772
364
339
285

CATEGORIES

  • 1,565
  • 1,523
  • 1,105
  • 2,183
  • 647
  • 1,235
  • 467
  • 392
  • 642

PRICE

9,626
11,998
15,466
20,787

PUBLISHED

689
1,532
4,805
20,787

PRODUCT TYPE

14,553
4,183
1,541
156
143
130
62
14
3
1
1

Computing and Technology

Track the latest developments in the fastest growing sector of the economy. Browse Research and Market’s Computing and Technology category for information resources on the theory and practice of computer science, information technology and/or computer engineering, both from a technical and a business point of view. Our listings include market data, prospects, company profiles and rankings, end-user trends, manuals, step-by-step guides, and courses.

The hardware section focuses on market volumes and forecasts, information on vendors and manufacturers of both final products and of semiconductors, circuits and materials. The Software section covers programming, applications, leading software development companies, cloud computing, and much more.

If you’re concerned about the storage of your precious data, don’t take any risks: browse this sub-category for up-to-date publications covering data centres, disk storage, server room co-location, data warehousing, and back up. A wide range of publications on nanotechnology is also featured. Show Less
Read more

PRODUCT TITLE
Full-System Simulation with Simics Full-System Simulation with Simics - Product Thumbnail Image

Full-System Simulation with Simics

Full-System Simulation with Simics discusses the benefits and key aspects of virtual platform simulations, using the Simics framework as a model. With examples and best practices that apply to any simulation...

October 2014

Google Earth Forensics

Google Earth Forensics is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based...

October 2014
Guerrilla Analytics Guerrilla Analytics - Product Thumbnail Image

Guerrilla Analytics

Doing data science is difficult. Projects are typically very dynamic with requirements that change as data understanding grows. The data itself arrives piecemeal, is added to, replaced, contains undiscovered...

October 2014
PCI Compliance. Edition No. 4 PCI Compliance. Edition No. 4 - Product Thumbnail Image

PCI Compliance. Edition No. 4

Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing...

October 2014
Bandwidth Needs Analysis of the RBOCs' Advanced Access Architectures: FTTP and FTTN Bandwidth Needs Analysis of the RBOCs' Advanced Access Architectures: FTTP and FTTN - Product Thumbnail Image

Bandwidth Needs Analysis of the RBOCs' Advanced Access Architectures: FTTP and FTTN

The Advanced Access Architecture thrusts of the major US carriers as one of the most important events in telecommunications history As such, the authors have been periodically issuing major reports...

October 2014
FROM
Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October) Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October) - Product Thumbnail Image

Computer System Validation - Reduce Costs and Avoid 483s: 2-day In-person Seminar (October)

Where: Philadelphia, PA (Venue to be announced shortly) When: October 23-24, 2014 Course Description: Significant changes in the regulations and industry standards for software validation are detailed...

October 2014
Studying and Designing Technology for Domestic Life Studying and Designing Technology for Domestic Life - Product Thumbnail Image

Studying and Designing Technology for Domestic Life

Evaluating and Designing Research Methods for Domestic Life provides you with the definitive, high-level book on research methods for domestic life. You will find descriptions of how to adapt existing...

October 2014

Analytical Instrument Qualification and System Validation: 2- day In-person Seminar (October)

Where: Chicago, IL(Venue to be announced shortly) When: October 20-21, 2014 Course Description: Analytical instruments should be qualified and systems should be validated to demonstrate suitability...

October 2014
GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October) - Product Thumbnail Image

GMP Compliance for Quality Control and Contract Laboratories: 2-day In-person Seminar (October)

Where: Chicago, IL (Venue to be announced shortly) When: October 16-17, 2014 Course Description: Quality control and related contract laboratories are considered at high risk because after testing and...

October 2014

Software Risk Management - Ways to FDA and MDD Compliance: 2-day In-person Seminar

Where: New York, NY (Venue to be announced shortly) When: October 16-17, 2014 Risk management has become the method of choice to ensure an effective and safety oriented device development process International...

October 2014
There's Not an App for That There's Not an App for That - Product Thumbnail Image

There's Not an App for That

There's Not an App for That will make your work stand out from the crowd. It walks you through mobile experiences, and teaches you to evaluate current UX approaches, enabling you to think outside of...

October 2014
Detecting and Combating Malicious Email Detecting and Combating Malicious Email - Product Thumbnail Image

Detecting and Combating Malicious Email

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity...

October 2014
The Basics of Digital Forensics. Edition No. 2 The Basics of Digital Forensics. Edition No. 2 - Product Thumbnail Image

The Basics of Digital Forensics. Edition No. 2

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies...

October 2014
Windows Performance Analysis Field Guide Windows Performance Analysis Field Guide - Product Thumbnail Image

Windows Performance Analysis Field Guide

Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing...

October 2014
Securing Mobile Ad Hoc Networks Securing Mobile Ad Hoc Networks - Product Thumbnail Image

Securing Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are formed by a group of mbile nodes connected by using wireless networks without the need of a fixed infrastructure. The devices on the MANET can communicate with each...

October 2014
Introduction to Light Trapping in Solar Cell and Photo-detector Devices Introduction to Light Trapping in Solar Cell and Photo-detector Devices - Product Thumbnail Image

Introduction to Light Trapping in Solar Cell and Photo-detector Devices

New Approaches to Light Trapping in Solar Cell Devices discusses in detail the use of photonic and plasmonic effects for light trapping in solar cells. It compares and contrasts texturing, the current...

October 2014
Industrial Network Security. Edition No. 2 Industrial Network Security. Edition No. 2 - Product Thumbnail Image

Industrial Network Security. Edition No. 2

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily...

October 2014
Measuring and Managing Information Risk Measuring and Managing Information Risk - Product Thumbnail Image

Measuring and Managing Information Risk

Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible...

October 2014
Designing and Building Security Operations Center Designing and Building Security Operations Center - Product Thumbnail Image

Designing and Building Security Operations Center

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward...

October 2014
CSA Guide to Cloud Computing CSA Guide to Cloud Computing - Product Thumbnail Image

CSA Guide to Cloud Computing

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance...

October 2014
Loading Indicator

Our Clients

Our clients' logos