Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Process Implementation for IT Professionals and Managers
Business Process Implementation for IT Professionals and Managers

The King is dead; long live the King! That famous cry sums up most aspects of modern business practice. The previously existing competitive environment, scope, internal structures, and automation support needs of an enterprise have disappeared and been replaced by other sets of conditions and requirements. In time, those needs, too, will...

Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Provides practical, step-by-step instructions on how to design and develop effective, costefficient data warehouses. DLC: Telecommunications Management.

Through dozens of case studies and real-world examples, this clearly written guide shows telecommunications managers how to build more effective data warehouses without wasting time and
...
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer and Intrusion Forensics (Artech House Computer Security Series)
Computer forensics and intrusion forensics are rapidly becoming
mainstream activities in an increasingly online society due to the
ubiquity of computers and computer networks. We make daily use of
computers either for communication or for personal or work transactions.
From our desktops and laptops we access Web servers, e-mail
...
Systematic Software Testing (Artech House Computer Library)
Systematic Software Testing (Artech House Computer Library)

There’s no quicker way to realize return on investment than to prevent or discover defects early in the software development lifecycle. Written by leading experts, this book delivers a flexible, risk-based process that improves your software testing capabilities and helps you do just that. Whether your organization already has a...

Security Fundamentals for E-Commerce (Artech House Computer Security Series. New Series)
Security Fundamentals for E-Commerce (Artech House Computer Security Series. New Series)
If you're charged with maintaining the security of e-commerce sites, you need this unique book that provides an in-depth understanding of basic security problems and relevant e-commerce solutions, while helping you implement today's most advanced security technologies.

From designing secure Web, e-commerce, and mobile commerce...

UMTS and Mobile Computing
UMTS and Mobile Computing
This unique book bridges the gap between ubiquitous computing (UBICOMP) and third generation mobile communication. A first-of-its-kind, this resource helps you decide which are the most promising technologies to use for specific mobile communication applications. Scenarios indicate how new applications will be developed and how to implement them....
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
System-on-a-Chip: Design and Test
System-on-a-Chip: Design and Test
This project started as an interim report. The purpose was to communicate
to various groups within Advantest about the main issues for system-on-achip
(SoC) design and testing and the common industrial practices. Over
one year’s time, a number of people contributed in various capacities to complete
this report.
...
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk commercial environments, the work focuses on the need...
Innovations in Internetworking (Artech House Telecommunication Library)
Innovations in Internetworking (Artech House Telecommunication Library)
Choosing the proper boundaries between functions is perhaps the primary activity of the computer system designer. Design principles that provide guidance in this choice of function placement are among the most important tools of a system designer. This paper discusses one class of function placement argument that has been used for...
Workflow Modeling: Tools for Process Improvement and Application Development
Workflow Modeling: Tools for Process Improvement and Application Development
Just when process orientation has become mainstream thinking for business people and
systems people alike, it seems that the flow of process-oriented literature has pretty well
stopped. So here we are, thousands of us, up to our necks in process improvement and
information systems projects, finding that there is a real shortage of
...
Multicarrier Techniques for 4G Mobile Communications
Multicarrier Techniques for 4G Mobile Communications
At recent major international conferences on wireless communications,
there have been several sessions on beyond third generation (3G) or fourth
generation (4G) mobile communications systems, where modulation/demodulation
and multiplexing/multiple access schemes related to multicarrier
techniques have drawn a lot of attention.
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy