Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lessons in Project Management
Lessons in Project Management

Most of the project management books on the market are basically textbooks. They are dry to begin with, and don't focus on the practical advice that most people need to run their projects. Lessons in Project Management, Second Edition does not assume that you are a project manager building a nuclear reactor or sending a...

Practical Insight into CMMI
Practical Insight into CMMI
The newly revised and expanded edition of the bestseller, Practical Insight into CMMI® is an essential reference for engineering, IT and management professionals striving to grasp the "look and feel of a successful business oriented process improvement implementation". The second edition brings you up to speed on CMMI® Version 1.2...
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely...
Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
Municipal Solid Waste Incinerator Residues (Studies in Environmental Science)
The International Ash Working Group (IAWG) was established in 1989 to conduct an in-depth review of the existing scientific data and develop a state-of-knowledge treatise on MSW incinerator residue characterisation, disposal, treatment and utilisation. The topics of operator and worker health and safety, and health risk assessment...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
Fuzzy Quantifiers: A Computational Theory (Studies in Fuzziness and Soft Computing)
From a linguistic perspective, it is quantification which makes all the difference between “having no dollars” and “having a lot of dollars”. And it is the meaning of the quantifier “most” which eventually decides if “Most Americans voted Kerry” or “Most Americans voted Bush” (as it...
The Law, In Plain English, For Photographers
The Law, In Plain English, For Photographers
The photographer's definitive business and legal resource is now completely updated and expanded. In this valuable guide, arts attorney Leonard DuBoff takes you step by step though all the legal aspects of the photography business. Here is expert advice for everything from contracts to trademarks, including government licenses, taxes, censorship,...
The Art of XSD - SQL Server XML schemas
The Art of XSD - SQL Server XML schemas

When information is exchanged in XML format, there needs to be an agreement between the sender and receiver about the structure and content of the XML document. An XSD (XML Schema Definition Language) Schema can be used to enforce this contract and validate the XML data being exchanged and, given that a lot of applications exchange...

The Ancient Sailing Season (Mnemosyne Supplements History and Archaeology of Classical Antiquity) (Latin Edition)
The Ancient Sailing Season (Mnemosyne Supplements History and Archaeology of Classical Antiquity) (Latin Edition)

A comprehensive examination of the effects of the shifting seasons on maritime trade, warfare and piracy durig antiquity, this book overturns many long-held assumptions concerning the capabilities of Graeco-Roman ships and sailors.

It is the long-standing belief among classical scholars that seafaring on the ancient Mediterranean
...
Theoretical Introduction to Programming
Theoretical Introduction to Programming
Including easily digested information about fundamental techniques and concepts in software construction, this book is distinct in unifying pure theory with pragmatic details. Driven by generic problems and concepts, with brief and complete illustrations from languages including C, Prolog, Java, Scheme, Haskell and HTML. This book is intended to...
Software Agreements Line by Line: How to Understand & Change Software Licenses & Contracts to Fit Your Needs
Software Agreements Line by Line: How to Understand & Change Software Licenses & Contracts to Fit Your Needs
In such a business climate that demands a heightened understanding and keen ability to leverage essential technologies, one must understand every element of an agreement as critical and essential as the software user/vendor contract. As there has long been a disconnect between the express interests of the end user and the objectives of the vendor...
Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy