Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Successful Program Management: Complexity Theory, Communication, and Leadership
Successful Program Management: Complexity Theory, Communication, and Leadership

Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.

Filling this void,
...

Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
The Method Framework for Engineering System Architectures
The Method Framework for Engineering System Architectures
One of the biggest sources of pain in system development is “system integration and test.” This is frequently where projects sailing along with all-green progress reports and Earned Value Management System status summaries start to see these indicators increasingly turn to yellow and then to red. Projects that were thought to be 80...
Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, with a particular emphasis on state-of-the-art techniques, trends, and improvement that have emerged over the last decade. After a brief introduction to the modern physical design problem, basic algorithmic...
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Software Requirements: Encapsulation, Quality, and Reuse
Software Requirements: Encapsulation, Quality, and Reuse

Software Requirements: Encapsulation, Quality, and Reuse describes how to make requirements, and their implementing code, easier to change through the use of Freedom methodology. Freedom reduces software life cycle costs by making requirements quickly adaptable to changing technology and business needs. This book examines the definition of...

Strategic Software Engineering
Strategic Software Engineering
Software is a disruptive technology that has changed how almost every
sector of human society and the economy works. Software is now pervasive;
it is a component of almost every industrial product or at least
essential to the development of such products. Software capabilities lie at
the core of the new national and
...
The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy