|
|
|
|
|
Firewall Policies and VPN ConfigurationsDeploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will... | | Enterprise Management with SAP SEM/ Business Analytics (SAP Excellence)In order to make strategy happen there is a need for powerful management information systems. SAP focuses on the application of modern business administration concepts, e.g. Value Based Management, the Balanced Scorecard, the Management Cockpit or flexible planning methods.
The book describes the methodology and implementation of a... | | Molecular Imprinting (Topics in Current Chemistry)
Molecularly Imprinted Polymers, by Karsten Haupt, Ana V. Linares, Marc Bompart und Bernadette Tse Sum Bui.- Physical Forms of MIPs, by Andrea Biffis, Gita Dvorakova und Aude Falcimaigne-Cordin.- Micro and Nanofabrication of Molecularly Imprinted Polymers, by Marc Bompart, Karsten Haupt und Cédric Ayela.-... |
|
|
| | Managing the Risks of IT Outsourcing (Computer Weekly Professional)Buyers or suppliers of IT outsourcing services are constantly tormented by the prospect of having to deal with the vicissitudes of risks in their projects. In today’s business environment, the precipitous rates of technological change have outpaced the ability of many organizations to support the IT function. These... | | Neural Networks and Pattern RecognitionThis book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known... |
|
|
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |