Home | Amazing | Today | Tags | Publishers | Years | Search 
Master Data Management and Customer Data Integration for a Global Enterprise
Master Data Management and Customer Data Integration for a Global Enterprise

This book is about interesting and exciting new developments in the area of information management. These developments are focused on new ways of structuring, choosing, understanding, and integrating information that is needed to run a business, service customers, and comply with numerous regulatory requirements.

To...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing
Mechanisms of Implicit Learning: Connectionist Models of Sequence Processing

What do people learn when they do not know that they are learning? Until recently all of the work in the area of implicit learning focused on empirical questions and methods. In this book, Axel Cleeremans explores unintentional learning from an information-processing perspective. He introduces a theoretical framework that unifies existing...

Multimodal Interactive Pattern Recognition and Applications
Multimodal Interactive Pattern Recognition and Applications

Our interest in human–computer interaction started with our participation in the TT2 project (“Trans–Type-2”, 2002–2005—http://www.tt2.atosorigin.es), funded by the European Union (EU) and coordinated by Atos Origin, which dealt with the development of statistical-based technologies for computer...

Technique of Film Editing, Reissue of 2nd Edition, Second Edition
Technique of Film Editing, Reissue of 2nd Edition, Second Edition

Enhanced version of the seminal text on editing includes a new foreword, a new afterword, a revamped cover and layout, as well as a lower price!

The single most comprehensive and engaging volume on film editing. Reisz and Millar introduce readers to every aspect of the editor's craft, providing a concise history of editing and...

jQuery Mobile
jQuery Mobile

Mobile applications come in two basic flavors: native applications, which are compiled programs that run natively on the device, and mobile web applications, which run inside a web browser on the device.

Native applications get almost all of the press these days, especially given the financial success of the iTunes App Store...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Data Center Fundamentals
Data Center Fundamentals

Master the basics of data centers to build server farms that enhance your Web site performance

  • Learn design guidelines that show how to deploy server farms in highly available and scalable environments
  • Plan site performance capacity with discussions of server farm architectures and their real-life...
Development with the Force.com Platform: Building Business Applications in the Cloud (2nd Edition)
Development with the Force.com Platform: Building Business Applications in the Cloud (2nd Edition)

Build Powerful, Scalable, Cloud-Based Enterprise Solutions Fast with the Newest Version of Force.com

 

Using Force.com, you can build enterprise applications with world-class value, scalability, and reliability--and do it in days or weeks, not months...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Real-Time Volume Graphics
Real-Time Volume Graphics

IN TRADITIONAL COMPUTER GRAPHICS, 3D objects are created using highlevel surface representations such as polygonal meshes, NURBS (nonuniform rational B-spline) patches, or subdivision surfaces. Using this modeling paradigm, visual properties of surfaces, such as color, roughness, and reflectance, are described by means of a shading...

Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy