Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Evaluating Information Systems: Public and Private Sector
Evaluating Information Systems: Public and Private Sector
Companies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.

The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public
...
Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection: Prevention versus Mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years....

Fundamental Data Compression
Fundamental Data Compression
Fundamental Data Compression provides all the information students need to be able to use this essential technology in their future careers. A huge, active research field, and a part of many people's everyday lives, compression technology is an essential part of today's Computer Science and Electronic Engineering courses.
...
IT Performance Management (Computer Weekly Professional)
IT Performance Management (Computer Weekly Professional)
IT Performance Management addresses the way organizations should balance the demand and the supply of information technology, optimizing the cost and maximizing the business value of IT.

In this book several aspects of IT performance management are described. The way this management is executed and the techniques, which
...
Structural Analysis: In Theory and Practice
Structural Analysis: In Theory and Practice
This book provides a comprehensive review of the classical methods of structural analysis and also the recent advances in computer applications.

Structural Analysis Rules of Thumb provides a comprehensive review of the classical methods of structural analysis and also the recent advances in computer applications. The prefect
...
Radar and ARPA Manual, Third Edition: Radar, AIS and Target Tracking for Marine Radar Users
Radar and ARPA Manual, Third Edition: Radar, AIS and Target Tracking for Marine Radar Users

Radar and ARPA Manual provides essential information for professional mariners and seagoing marine engineers, including those undertaking electronic navigation system courses and marine operations qualifications internationally.

This fully revised new edition serves as the most comprehensive reference on equipment and techniques...

Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Mastering Statistical Process Control: A Handbook for Performance Improvement Using SPC Cases
Mastering Statistical Process Control: A Handbook for Performance Improvement Using SPC Cases
Mastering Statistical Process Control shows how to understand business or process performance more clearly and more effectively. This practical book is based on a rich and varied selection of case studies from across industry and commerce, including material from the manufacturing, extractive and service sectors. It will enable readers to...
Contemporary Theory of Conservation
Contemporary Theory of Conservation
This essay deals with contemporary theory of conservation.
Perhaps the boldest thesis in the text is the very idea that a contemporary
theory of conservation actually exists. No one doubts
that there are a number of schemes, ideas and opinions – of theories
or fragments of theories that differ to a greater or lesser...
Managing the Risks of IT Outsourcing (Computer Weekly Professional)
Managing the Risks of IT Outsourcing (Computer Weekly Professional)
Buyers or suppliers of IT outsourcing services are constantly tormented
by the prospect of having to deal with the vicissitudes of
risks in their projects. In today’s business environment, the
precipitous rates of technological change have outpaced the ability
of many organizations to support the IT function. These
...
Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the...
Matlab: A Practical Introduction to Programming and Problem Solving
Matlab: A Practical Introduction to Programming and Problem Solving

MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering problems. The book provides a systematic, step-by-step approach, building on...

Result Page: 17 16 15 14 13 12 11 10 9 8 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy