Home | Amazing | Today | Tags | Publishers | Years | Search 
Implementing and Managing eGovernment: An International Text
Implementing and Managing eGovernment: An International Text
Check out the companion website at www.sagepub.co.uk/heeks 

Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners.

Richard Heeks draws on international examples to guide readers through...

Programming Microsoft SQL Server 2008 (PRO-Developer)
Programming Microsoft SQL Server 2008 (PRO-Developer)

Written by industry professionals who have been working with SQL Server 2008 since the earliest code, this reference expertly covers the programming fundamentals for SQL Server 2008 with crucial real-world context and extensive code samples.

Get the hands-on programming instruction, practical examples, and best practices you
...

Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Landau Lifshitz Equations (Frontiers of Research With the Chinese Academy of Sciences)
Landau Lifshitz Equations (Frontiers of Research With the Chinese Academy of Sciences)
This is a comprehensive introduction to Landau Lifshitz equations and Landau Lifshitz Maxwell equations, beginning with the work by Yulin Zhou and Boling Guo in the early 1980s and including most of the work done by this Chinese group led by Zhou and Guo since. The book focuses on aspects such as the existence of weak solutions in multi dimensions,...
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious...
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action: Configuring the JBoss Application Server
JBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,...
Developing Effective Engineering Leadership (IEE Management of Technology Series, 21)
Developing Effective Engineering Leadership (IEE Management of Technology Series, 21)

Engineering companies and other organizations face many serious challenges in the 21st Century. One that is now becoming widely recognized is the loss of corporate knowledge through staff turnover, whether it is natural or forced through downsizing or de-layering. The company’s store of knowledge and expertise is an asset built up through...

Computational Nonlinear Morphology: With Emphasis on Semitic Languages (Studies in Natural Language Processing)
Computational Nonlinear Morphology: With Emphasis on Semitic Languages (Studies in Natural Language Processing)
"I would recommend it as a useful source of inspiration for researchers in the field..." Computational Linguistics

By the late 1970s, phonologists, and later morphologists, had departed from a linear approach for describing morphophonological operations to a nonlinear one. Computational models, however, remain
...
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

Algorithms in a Nutshell (O'Reilly)
Algorithms in a Nutshell (O'Reilly)
Creating robust software requires the use of efficient algorithms, but programmers seldom think about them until a problem occurs. Algorithms in a Nutshell describes a large number of existing algorithms for solving a variety of problems, and helps you select and implement the right algorithm for your needs -- with just enough math to let...
Omnipage Power!
Omnipage Power!
With substantially increased accuracy and the ability to convert both scanned documents and PDF files into editable text and images for use in computer software applications such as MS Word and Excel, OmniPage Pro 11 has become an essential tool for the digital workplace. "OmniPage Power!" is here to help you make maximum use of the...
Result Page: 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy