Home | Amazing | Today | Tags | Publishers | Years | Search 
SAP Implementation Unleashed: A Business and Technical Roadmap to Deploying SAP
SAP Implementation Unleashed: A Business and Technical Roadmap to Deploying SAP

SAP can help you capture better information and deliver it more quickly, allowing you to make better decisions and maximize the business value of everything you do. However, SAP implementations require massive effort, total buy-in, and significant change throughout the organization. In SAP Implementation Unleashed,...

Platforms, Markets and Innovation
Platforms, Markets and Innovation

`In her pioneering book Platform Leadership (with Michael Cusumano), Gawer gave us the strategy of building coalitions of customers, suppliers, and complementors. Now, she brings together a number of the leading researchers in the area of platform strategy to give us a book that will be a key reference for both practitioners and...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Microelectromechanical Systems: Advanced Materials and Fabrication Methods
Microelectromechanical Systems: Advanced Materials and Fabrication Methods

Microelectromenchanical systems (MEMS) is a revolutionary field that adapts for new uses a technology already optimized to accomplish a specific set of objectives. The silicon-based integrated circuits process is so highly refined it can produce millions of electrical elements on a single chip and define their critical dimensions to...

Serial Killer Investigations
Serial Killer Investigations

In 1977, FBI Special Agent Robert Ressler first used the term ‘serial killer’ after a visit to Bramshill Police Academy, near London, where someone referred to a ‘serial burglar’. The inspired coinage was soon in general use to describe killers such as necrophile Ed Kemper (ten victims), schizophrenic Herb Mullin (14),...

Large Time Asymptotics for Solutions of Nonlinear Partial Differential Equations
Large Time Asymptotics for Solutions of Nonlinear Partial Differential Equations

A large number of physical phenomena are modeled by nonlinear partial differential equations, subject to appropriate initial/ boundary conditions; these equations, in general, do not admit exact solution. The present monograph gives constructive mathematical techniques which bring out large time behavior of solutions of these model equations....

Joint Source-Channel Decoding: A Cross-Layer Perspective with Applications in Video Broadcasting
Joint Source-Channel Decoding: A Cross-Layer Perspective with Applications in Video Broadcasting

Traditionally, cross-layer and joint source-channel coding were seen as incompatible with classically structured networks but recent advances in theory changed this situation. Joint source-channel decoding is now seen as a viable alternative to separate decoding of source and channel codes, if the protocol layers are taken into account. A...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

CCNA Security Course Booklet, Version 1.0
CCNA Security Course Booklet, Version 1.0

The Cisco CCNA Security curriculum provides a comprehensive overview of contemporary network security, helping Cisco Networking Academy students systematically prepare for the latest CCNA Security exam. While extensive online study resources are available, many students and instructors have requested a low-cost printed resource that can be...

Advances in Chemical Physics: Modern Nonlinear Optics, Volume 119, Part 2, 2nd Edition
Advances in Chemical Physics: Modern Nonlinear Optics, Volume 119, Part 2, 2nd Edition

The new edition will provide the sole comprehensive resource available for non-linear optics, including detailed descriptions of the advances over the last decade from world-renowned experts.

This volume, produced in three parts, is the Second Edition of Volume 85 of the series, Modern Nonlinear Optics, edited by M.W. Evans and S....

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide
Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide

Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide: Foundation learning for SWITCH 642-813

 

Richard Froom, CCIE No. 5102

Balaji Sivasubramanian

Erum...

Optimization Theory and Methods: Nonlinear Programming
Optimization Theory and Methods: Nonlinear Programming

Optimization is a subject that is widely and increasingly used in science, engineering, economics, management, industry, and other areas. It deals with selecting the best of many possible decisions in real-life environment, constructing computational methods to find optimal solutions, exploring the theoretical properties, and studying...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy