登入帳戶  | 訂單查詢  | 購物車/收銀台( 0 ) | 在線留言板  | 付款方式  | 聯絡我們  | 運費計算  | 幫助中心 |  加入書簽
會員登入 新註冊 | 新用戶登記
HOME新書上架暢銷書架好書推介特價區會員書架精選月讀2023年度TOP分類閱讀雜誌 香港/國際用戶
最新/最熱/最齊全的簡體書網 品種:超過100萬種書,正品正价,放心網購,悭钱省心 送貨:速遞 / EMS,時效:出貨後2-3日

2024年03月出版新書

2024年02月出版新書

2024年01月出版新書

2023年12月出版新書

2023年11月出版新書

2023年10月出版新書

2023年09月出版新書

2023年08月出版新書

2023年07月出版新書

2023年06月出版新書

2023年05月出版新書

2023年04月出版新書

2023年03月出版新書

2023年02月出版新書

『簡體書』计算机新技术教程

書城自編碼: 2862741
分類: 簡體書→大陸圖書→教材研究生/本科/专科教材
作者: 汤晓兵、徐遵义、 赵洪銮、白彧、袁卫华
國際書號(ISBN): 9787302434108
出版社: 清华大学出版社
出版日期: 2016-07-01
版次: 1 印次: 1
頁數/字數: 192/299000
書度/開本: 16开 釘裝: 平装

售價:NT$ 218

我要買

share:

** 我創建的書架 **
未登入.



新書推薦:
不胜欢喜
《 不胜欢喜 》

售價:NT$ 296.0
现代欧洲史:1500—1815
《 现代欧洲史:1500—1815 》

售價:NT$ 493.0
高颜值创意饮品:咖啡 茶饮 鸡尾酒 气泡水
《 高颜值创意饮品:咖啡 茶饮 鸡尾酒 气泡水 》

售價:NT$ 335.0
慢慢来,好戏都在烟火里
《 慢慢来,好戏都在烟火里 》

售價:NT$ 279.0
一间自己的房间
《 一间自己的房间 》

售價:NT$ 223.0
波段交易的高级技术:股票和期权交易者的资金管理、规则、策略和程序指南
《 波段交易的高级技术:股票和期权交易者的资金管理、规则、策略和程序指南 》

售價:NT$ 442.0
人,为什么需要存在感:罗洛·梅谈死亡焦虑
《 人,为什么需要存在感:罗洛·梅谈死亡焦虑 》

售價:NT$ 381.0
锁国:日本的悲剧
《 锁国:日本的悲剧 》

售價:NT$ 437.0

編輯推薦:
1、取材新颖,专业优势突出,均系信息技术的热点领域,代表*成果和研究方向;
2、涵盖计算机硬、软件范畴,深入浅出,涉及大量常用专用词汇、语法和知识点;
3、每个单元均带有自编练习,围绕主题,形式多样,适合互动,激发读者学习兴趣;
4、通过引入、分析和解决问题的过程,形成完整的学习体系,增强专业英语自学技能;5、内容图文并茂,循序渐进,培养和提高专业英语的阅读、翻译和写作等综合应用能力。
內容簡介:
本书精选和提炼了目前计算机专业领域最新的研究成果和学术进展,内容取材广泛,难易适中,每单元各具特色。通过对文章中专业词汇、语法结构的介绍和分析,为读者将来在信息技术以及相关研究方向的英文资料的阅读、翻译和写作等能力提供了重要的支撑和保证。本书结合作者多年计算机教学和科研中的宝贵经验,以及与国外学术交流的体会总结,在保证本书专业知识领先的同时,更着重体现了内容的实用性和针对性。读者在提高专业英语读、写、译水平的同时,可通过本书及时地跟踪IT领域内的顶尖技术,把握学术上的研究热点,确立未来的学习和科研方向。
本书面向的读者是高校信息技术相关专业的本科生、大专生或是从事软、硬件开发及相关领域的工程技术人员,通过对每个单元中英文文献专题的引入、分析和解决问题的过程,培养和提高读者在专业英语方面的阅读、翻译和写作的综合能力。
目錄
Unit 1HardwareMicrowave Integrated Circuits1
1.1Classification of Microwave Integrated
Circuits1
1.2Microwave Circuits in a Communication
System6
1.3Summary9
1.4New Words and Expressions10
1.5Questions10
1.6Problems12Unit 2SoftwareMicrosoft Project 2013 and
the Project
Management Domain13
2.1History of Project Management13
2.2Exploring Project Management Industry
Standards14
2.2.1Project Management Body of Knowledge
PMBOK14
2.2.2PRINCE218
2.3WBS, Phases and Control Points, Methodologies,
and Life Cycles20
2.3.1Work Breakdown StructureWBS20
2.3.2Managerial Control21
2.3.3Phases and Gates21
2.3.4Methodologies22
2.3.5Life Cycles22
2.4Using Microsoft Project with Methodologies and
Life Cycles22
2.4.1Waterfall Development Process23
2.4.2Iterative Development23
2.4.3Research Project27
2.5Accommodating Teaming Styles27
2.6Consultants Tips28
2.6.1Determine the Approach to Use in
Managing Your Project28
2.6.2Use WBS as a First Step in Project
Definition28
2.6.3Use the 59 Checklist for Planning29
2.7New Words and Expressions29
2.8Questions30
2.9Problems31Unit 3DatabaseNoSQL Databases: An
Overview 32
3.1NoSQL: What does it mean32
3.2Why NoSQL Databases32
3.3Aggregate Data Models33
3.4Distribution Models34
3.5CAP theorem35
3.6Types of NoSQL Databases36
3.6.1KeyValue databases36
3.6.2Document databases37
3.6.3Column family stores38
3.6.4Graph Databases38
3.7Why choose NoSQL database40
3.8Choosing NoSQL database41
3.9Schemaless ramifications41
3.10Conclusion42
3.11New Words and Expressions42
3.12Questions42
3.13Problems45Unit 4ProgrammingWhat Software
Architects Need to
Know About DevOps 46
4.1What Software Architects Need to Know About
DevOps46
4.2Defining DevOps46
4.3DevOps Practices and Architectural Implications48
4.4Organizational Aspects of DevOps50
4.5Implications for Software Architecture:
Microservices51
4.6Summary52
4.7New Words and Expressions53
4.8Questions53
4.9Problems56Unit 5Office ComputingThe Ultimate
Players Guide to
MinecraftXbox Edition: Gathering Resources 57
5.1Introducing the HUD57
5.2Avoiding Getting Lost60
5.3Improving Your Tools61
5.4Chests: Safely Stashing Your Stuff63
5.5Avoiding Monsters64
5.6Hunger Management66
5.7Your Mission: Food, Resources, and
Reconnaissance67
5.7.1Food on the Run68
5.7.2Finding a Building Site70
5.8A Resourceful Guide to the Creative Mode
Inventory72
5.9The Bottom Line74
5.10New Words and Expressions74
5.11Questions75
5.12Problems77Unit 6NetworkingTroubleshooting Methods
for Cisco IP
Networks78
6.1Troubleshooting Principles78
6.2Structured Troubleshooting Approaches81
6.2.1The TopDown Troubleshooting
Approach83
6.2.2The BottomUp Troubleshooting
Approach84
6.2.3The DivideandConquer
Troubleshooting
Approach85
6.2.4The FollowthePath
Troubleshooting
Approach86
6.2.5The CompareConfigurations Troubleshooting
Approach87
6.2.6The SwapComponents Troubleshooting
Approach88
6.3Troubleshooting Example Using Six Different
Approaches89
6.4Summary91
6.5New Words and Expressions91
6.6Questions92
6.7Problems94Unit 7Mobile ApplicationWhats Special about Mobile
Testing? 95
7.1User Expectations96
7.2Mobility and Data Networks97
7.3Mobile Devices98
7.4Mobile Release Cycles100
7.5Mobile Testing Is Software Testing101
7.6Summary102
7.7New Words and Expressions102
7.8Questions103
7.9Problems105Unit 8Web DevelopmentThe Mobile
Commerce Revolution
and the Current State of Mobile106
8.1Americans and Smartphones106
8.2Mobile Around the World109
8.3Mobile Commerce110
8.4Beyond the Numbers110
8.5The Bottom Line113
8.6New Words and Expressions113
8.7Questions114
8.8Problems116Unit 9SecurityInformation Security
Principles of
Success117
9.1Introduction117
9.2Principle 1: There Is No Such Thing As Absolute
Security117
9.3Principle 2: The Three Security Goals Are
Confidentiality, Integrity, and Availability119
9.3.1Integrity Models119
9.3.2Availability Models120
9.4Principle 3: Defense in Depth as Strategy120
9.5Principle 4: When Left on Their Own, People
Tend to Make the Worst Security Decisions122
9.6Principle 5: Computer Security Depends on Two
Types of Requirements: Functional and
Assurance122
9.7Principle 6: Security Through Obscurity Is Not
an Answer123
9.8Principle 7: Security = Risk Management124
9.9Principle 8: The Three Types of Security
Controls Are Preventative, Detective, and
Responsive126
9.10Principle 9: Complexity Is the Enemy of
Security127
9.11Principle 10: Fear, Uncertainty, and Doubt Do
Not Work in Selling Security127
9.12Principle 11: People, Process, and Technology
Are All Needed to Adequately Secure a System
or Facility127
9.13Principle 12: Open Disclosure of Vulnerabilities
Is Good for Security!128
9.14Summary129
9.15New Words and Expressions129
9.16Questions130
9.17Problems131Unit 10Web ServicesDesigning Software
in a Distributed
World132
10.1Visibility at Scale133
10.2The Importance of Simplicity134
10.3Composition134
10.3.1Load Balancer with Multiple Backend
Replicas134
10.3.2Server with Multiple Backends136
10.3.3Server Tree138
10.4Distributed State139
10.5The CAP Principle142
10.5.1Consistency142
10.5.2Availability143
10.5.3Partition Tolerance143
10.6Loosely Coupled Systems145
10.7Speed147
10.8Summary150
10.9New Words and Expressions151
10.10Questions151
10.11Problems153Unit 11Big DataBig Data Computing154
11.1Introduction154
11.2Apache Hadoop Data modelling156
11.3NoSQL Big Data systems157
11.3.1Key Value stores157
11.3.2Document databases157
11.3.3Graph databases158
11.3.4XML databases158
11.3.5Distributed Peer Stores158
11.3.6Object stores159
11.4Definitions of Data Management 159
11.4.1Data management159
11.4.2Big data management BDM160
11.5The State of Big Data Management160
11.6Big Data Tools162
11.6.1Big data tools: Jaspersoft BI Suite162
11.6.2Big data tools: Pentaho Business
Analytics163
11.6.3Big data tools: Karmasphere Studio and
Analyst163
11.6.4Big data tools: Talend Open Studio164
11.6.5Big data tools: Skytree Server164
11.6.6Big data tools: Tableau Desktop and
Server165
11.6.7Big data tools: Splunk165
11.7New Words and Expressions166
11.8Questions166
11.9Problems168Unit 12Cloud ComputingThe Practice of
Cloud
System Administration: Operations in a
Distributed World169
12.1Distributed Systems Operations170
12.1.1SRE versus Traditional Enterprise
IT170
12.1.2Change versus Stability171
12.1.3Defining SRE173
12.1.4Operations at Scale174
12.2Service Life Cycle177
12.2.1Service Launches178
12.2.2Service Decommissioning180
12.3Organizing Strategy for Operational Teams180
12.3.1Team Member Day Types183
12.3.2Other Strategies185
12.4Virtual Office186
12.4.1Communication Mechanisms187
12.4.2Communication Policies187
12.5Summary188
12.6New Words and Expressions189
12.7Questions190
12.8Problems191Answers to Questions193References194

 

 

書城介紹  | 合作申請 | 索要書目  | 新手入門 | 聯絡方式  | 幫助中心 | 找書說明  | 送貨方式 | 付款方式 香港用户  | 台灣用户 | 海外用户
megBook.com.tw
Copyright (C) 2013 - 2024 (香港)大書城有限公司 All Rights Reserved.