Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Successful Program Management: Complexity Theory, Communication, and Leadership
Successful Program Management: Complexity Theory, Communication, and Leadership

Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.

Filling this void,
...

Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, with a particular emphasis on state-of-the-art techniques, trends, and improvement that have emerged over the last decade. After a brief introduction to the modern physical design problem, basic algorithmic...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
A Guide to IT Contracting: Checklists, Tools, and Techniques
A Guide to IT Contracting: Checklists, Tools, and Techniques

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal...

TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, including both piconets and scatternets, conducted since 2001. The book provides insights into the performance of Bluetooth networks through an analytical approach based upon...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy