Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Cacti 0.8 Beginner's Guide
Cacti 0.8 Beginner's Guide

Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.

One definition of network management from the...

Agile Testing: A Practical Guide for Testers and Agile Teams
Agile Testing: A Practical Guide for Testers and Agile Teams

We were early adopters of Extreme Programming (XP), testing on XP teams that weren’t at all sure where testers or their brand of testing fit in. At the time, there wasn’t much in the agile (which wasn’t called agile yet) literature about acceptance testing, or how professional testers might contribute. We learned not...

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation
Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

PeopleSoft financial applications have been recognized as a leading ERP product across a wide range of industries that help organizations automate their accounting operations, cut costs, and streamline business processes. They offer industry leading solutions for organizations' global needs, however complex they may be.

...

Management Information Systems (12th Edition)
Management Information Systems (12th Edition)

We wrote this book for business school students who want an in-depth look at how today's business firms use information technologies and systems to achieve corporate objectives. Information systems are one of the major tools available to business managers for achieving operational excellence, developing new products and services,...

Information Technology Auditing (with ACL CD-ROM)
Information Technology Auditing (with ACL CD-ROM)

The third edition of this text contains key improvements and changes that continue to provide instructors and students with the best information technology auditing text available. This edition has been reorganized and expanded to address the internal control and audit issues mandated by Sarbanes-Oxley legislation. The third edition...

Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench
Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench

Some TIME ago a group of mathematicians and computer scientists (including the editors of this volume) thought of making a scientific pilgrimage to the birthplace of al-Khw&rizmf, the outstanding ninth-century mathematician who gave his name to the word "algorithm". As his name indicates, al-Khwarizmi came from the Khorezm...

Affiliate Millions: Make a Fortune using Search Marketing on Google and Beyond
Affiliate Millions: Make a Fortune using Search Marketing on Google and Beyond

For half my life—fully 18 of my 36 years—I filled out timesheets, accounting for every minute of my workday to corporations both large and small who valued my time far below my own personal estimations of its worth. Degrees and certifications combined with long hours, hard work, and a can-do attitude produced a...

Thermodynamic Cycles: Computer-Aided Design and Optimization (Chemical Industries)
Thermodynamic Cycles: Computer-Aided Design and Optimization (Chemical Industries)
Development in classical thermodynamics is, logically and traditionally, aimed at the analysis of cycles. Computational efforts impose harsh constraints on the kinds and amounts of cycle analyses that can reasonably be attempted. Cycle simulations cannot approach realistic complexity. Even relative sensitivity analyses based on...
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 1
A new procedure for combined validation of learning models – built for specifically uncertain data – is briefly described. The procedure, called the queue validation, relies on a combination of resubstitution with the modified learn-andtest paradigm. In the initial experiment [Burda and Hippe 2010] the developed...
Principles of Information Systems
Principles of Information Systems
As organizations continue to operate in an increasingly competitive and global marketplace, workers in all business areas including accounting, finance, human resources, marketing, operations management, and production must be well prepared to make significant contributions required for success. Regardless of your future role, you...
Microsoft SharePoint 2010: Business Connectivity Services
Microsoft SharePoint 2010: Business Connectivity Services
Microsoft SharePoint 2010: Business Connectivity Services helps small and medium-sized businesses as well as bigger organizations put their business data to work—and create valuable business solutions. Use Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2010, or Microsoft SharePoint Online (part of...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy