Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Evolution and Feedback: Theory and Practice
Software Evolution and Feedback: Theory and Practice
Evolution of software has long been recognized as one of the most problematic and challenging areas in the field of software engineering, as evidenced by the high, often up to 60-80%, life-cycle costs attributed to this activity over the life of a software system.В  Studies of software evolution are central to the understanding and practice...
Cyberculture and New Media.
Cyberculture and New Media.
In the extension of digital media from optional means to central site of activity, the domains of language, art, learning, play, film, and politics have been subject to radical reconfigurations as mediating structures. This book examines how this changed relationship has in each case shaped a new form of discourse between self and culture and...
Digital Design (VHDL): An Embedded Systems Approach Using VHDL
Digital Design (VHDL): An Embedded Systems Approach Using VHDL

This book provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It deals with digital design as an activity in a larger systems design context. Instead of focusing on gate-level design and aspects of digital design that have diminishing relevance in a...

Management &Organisational Behaviour (7th Edition)
Management &Organisational Behaviour (7th Edition)

Helps students of today become effective managers of tomorrow by truly understanding organisational behaviour.

For undergraduate and graduate courses in Organisational Behaviour and Management.

Taking a managerial approach and demonstrating the application of behavioural science within the workplace, this text...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Linking Government Data
Linking Government Data

The Linked Open Data Project started just four years ago in 2007. In that short time Linked Data has grown into an almost mainstream activity for many governments around the world. As of this writing, the US Government’s open data site listed twenty one countries whose governments publish open data regarding the operations of...

Big Data For Dummies
Big Data For Dummies

Find the right big data solution for your business or organization

Big data management is one of the major challenges facing business, industry, and not-for-profit organizations. Data sets such as customer transactions for a mega-retailer, weather patterns monitored by meteorologists, or social network activity can quickly...

Inter-cooperative Collective Intelligence: Techniques and Applications (Studies in Computational Intelligence)
Inter-cooperative Collective Intelligence: Techniques and Applications (Studies in Computational Intelligence)

This book covers the latest advances in the rapid growing field of inter-cooperative collective intelligence aiming the integration and cooperation of various computational resources, networks and intelligent processing paradigms to collectively build intelligence and advanced decision support and interfaces for end-users. The book brings a...

Foundations of Embedded Systems (Studies in Systems, Decision and Control (195))
Foundations of Embedded Systems (Studies in Systems, Decision and Control (195))
This book is devoted to embedded systems (ESs), which can now be found in practically all fields of human activity. Embedded systems are essentially a special class of computing systems designed for monitoring and controlling objects of the physical world.

The book begins by discussing the distinctive features of
...
Microsoft Windows 2000 Server Operations Guide
Microsoft Windows 2000 Server Operations Guide
Maintain and troubleshoot your server installations with comprehensive technical information and tools-direct from the Windows 2000 product development team. Part of the official MICROSOFT WINDOWS 2000 SERVER RESOURCE KIT, this practical guide is now available separately for IT professionals focused on day-to-day operations. Coverage includes...
Citrix Access Suite 4 Advanced Concepts: The Official Guide, Second Edition
Citrix Access Suite 4 Advanced Concepts: The Official Guide, Second Edition
What is access? Access is a means to an end—the means of closing the gap that separates ideas, understanding, knowledge, insight, and action. Access facilitates, access informs, access empowers, and access has the ability to transform the way we work, live, play and learn. From the telegraph to radio to television and the Internet,...
Biofuels for Transport: An International Perspective
Biofuels for Transport: An International Perspective
The IEA last published a book on biofuels in 1994 (Biofuels). Many developments have occurred in the past decade, though policy objectives remain similar: improving energy security and curbing greenhouse gas emissions are, perhaps more than ever, important priorities for IEA countries. And, more than ever, transportation energy...
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy