• +353-1-416-8900(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)

PRODUCT FILTERS

REGION

7,684
2,308
2,229
2,089
1,570

COUNTRY

1,051
777
365
339
285

CATEGORIES

  • 1,577
  • 1,525
  • 1,117
  • 2,203
  • 659
  • 1,239
  • 467
  • 393
  • 642

PRICE

9,790
12,229
15,529
20,832

PUBLISHED

623
1,502
4,737
20,832

PRODUCT TYPE

14,591
4,189
1,541
156
143
130
62
15
3
1
1

Computing and Technology

Track the latest developments in the fastest growing sector of the economy. Browse Research and Market’s Computing and Technology category for information resources on the theory and practice of computer science, information technology and/or computer engineering, both from a technical and a business point of view. Our listings include market data, prospects, company profiles and rankings, end-user trends, manuals, step-by-step guides, and courses.

The hardware section focuses on market volumes and forecasts, information on vendors and manufacturers of both final products and of semiconductors, circuits and materials. The Software section covers programming, applications, leading software development companies, cloud computing, and much more.

If you’re concerned about the storage of your precious data, don’t take any risks: browse this sub-category for up-to-date publications covering data centres, disk storage, server room co-location, data warehousing, and back up. A wide range of publications on nanotechnology is also featured. Show Less
Read more

PRODUCT TITLE
Securing Mobile Ad Hoc Networks Securing Mobile Ad Hoc Networks - Product Thumbnail Image

Securing Mobile Ad Hoc Networks

Mobile ad hoc networks (MANETs) are formed by a group of mbile nodes connected by using wireless networks without the need of a fixed infrastructure. The devices on the MANET can communicate with each...

October 2014
Introduction to Light Trapping in Solar Cell and Photo-detector Devices Introduction to Light Trapping in Solar Cell and Photo-detector Devices - Product Thumbnail Image

Introduction to Light Trapping in Solar Cell and Photo-detector Devices

New Approaches to Light Trapping in Solar Cell Devices discusses in detail the use of photonic and plasmonic effects for light trapping in solar cells. It compares and contrasts texturing, the current...

October 2014
Industrial Network Security. Edition No. 2 Industrial Network Security. Edition No. 2 - Product Thumbnail Image

Industrial Network Security. Edition No. 2

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily...

October 2014
Measuring and Managing Information Risk Measuring and Managing Information Risk - Product Thumbnail Image

Measuring and Managing Information Risk

Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible...

October 2014
Designing and Building Security Operations Center Designing and Building Security Operations Center - Product Thumbnail Image

Designing and Building Security Operations Center

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward...

October 2014
CSA Guide to Cloud Computing CSA Guide to Cloud Computing - Product Thumbnail Image

CSA Guide to Cloud Computing

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance...

October 2014

Compliance in the Cloud: Maintaining Control When Moving to Cloud-Based Hosting: 2-Day In-person Seminar

Where: Raleigh, NC (Venue to be announced shortly) When: October 9-10, 2014 Are you considering moving your data into the cloud, but are worried about compliance issues and loss of control? Would you...

October 2014

Managing Risk through PHI Mapping: Do You Know Where Your Data Is: One and Half day In-person Seminar

Where: Boston, MA (Venue to be announced shortly) When: October 6-7, 2014 Protected Health Information (PHI) mapping refers to identifying where PHI resides, how it is used and how it is protected When...

October 2014
Shape Memory Alloy Engineering Shape Memory Alloy Engineering - Product Thumbnail Image

Shape Memory Alloy Engineering

Shape Memory Alloy Engineering introduces materials, mechanical, and aerospace engineers to shape memory alloys (SMAs), providing a unique perspective that combines fundamental theory with new approaches...

October 2014
Relating System Quality and Software Architecture Relating System Quality and Software Architecture - Product Thumbnail Image

Relating System Quality and Software Architecture

System Quality and Software Architecture collects state-of-the-art knowledge on how to intertwine software quality requirements with software architecture and how quality attributes are exhibited by...

September 2014
Writing Successful UX Proposals Writing Successful UX Proposals - Product Thumbnail Image

Writing Successful UX Proposals

Bringing new project funding and business opportunities to your organization is a vital part of UX professionals' growth and success. Writing Successful UX Proposals teaches the proven techniques for...

September 2014
Information Hiding in Speech Signal for Secure Communication Information Hiding in Speech Signal for Secure Communication - Product Thumbnail Image

Information Hiding in Speech Signal for Secure Communication

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information...

September 2014

Building a Sustainable Validation Program from Top to Bottom: One and a Half day In-Person Seminar

Where: DoubleTree San Diego Downtown 1646 Front Street, San Diego, California, 92101, USA When: September 25-26, 2014 Companies face many common issues or confusions that arise while creating a validation...

September 2014

Essentials of ERM and Assessing its Effectiveness Using ISO 31000: 2-Day In-Person Seminar

Where: New York, NY (Venue to be announced shortly) When: September 25-26, 2014 If an internal audit is to assess the effectiveness of the organization's risk management program, every member of the...

September 2014
Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Course Materials Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Course Materials  - Product Thumbnail Image

Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Course Materials

Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) Course Materials The Patent Protection for Software course will take place on the 25 September...

September 2014
Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London) - Product Thumbnail Image

Patent Protection for Software-Related and Business-Related Inventions in the EU and US (Course, London)

The Patent Protection for Software course will take place on the 25 September 2014 at The Rembrandt Hotel, London TOPICS TO BE COVERED AT THIS SEMINAR INCLUDE: - Developments in Europe for Computer-Related...

September 2014

Analytical Instrument Qualification and System Validation: 2- day In-person Seminar (September)

Analytical instruments should be qualified and systems should be validated to demonstrate suitability for the intended use This two day in-person seminar will provide attendees the regulatory background...

September 2014

Managing an Effective AML Compliance Program: 2-day In-Person Seminar (September)

Where: The Westin Chicago River North 320 North Dearborn Street, Chicago, IL 60654, USA Where: September 18-19, 2014 Are the financial transactions within your organization subject to money laundering...

September 2014

The Microbiological Element of Cleaning Validation in Oral Solid Dosage Manufacturing: 2- day In-person Seminar

Where: New Brunswick, NJ (Venue to be announced shortly) When: September 18-19, 2014 The various regulatory agencies have expectations that oral solid dosage pharmaceutical manufacturers will demonstrate...

September 2014

Navigating through Maze of In-vitro Diagnostics (IVD) Regulations: A systematic approach from Regulatory Strategy to Regulatory Approvals in U.S./Europe/Canada: 2-day In-Person Seminar

Courtyard Marriott Boston - Cambridge, MA September 18-19th, 2014 In-vitro Diagnostics (IVD) products provide critical information on patient's health condition, based on which the healthcare provider...

September 2014
Loading Indicator

Our Clients

Our clients' logos