Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Telephony Integration, Second Edition
Computer Telephony Integration, Second Edition
Since the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies...
The ROI from Software Quality
The ROI from Software Quality
The ROI from Software Quality provides the tools needed for software engineers and project managers to calculate how much they should invest in quality, what benefits the investment will reap, and just how quickly those benefits will be realized. This text provides the quantitative models necessary for making real and reasonable calculations and it...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
Six Sigma Software Development, Second Edition
Six Sigma Software Development, Second Edition
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts...
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
As consultants for the David Consulting Group and in our earlier careers, we have been involved with IT for at least 25 years. During that time, we have been involved in many successful projects and have been confronted by many challenges.

Our collective experiences have culminated in a certain amount of “professional
...
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources...
Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation
Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, with a particular emphasis on state-of-the-art techniques, trends, and improvement that have emerged over the last decade. After a brief introduction to the modern physical design problem, basic algorithmic...
Knowledge Retention: Strategies and Solutions
Knowledge Retention: Strategies and Solutions
‘‘Knowledge Retention: Strategies and Solutions will become paramount toward achieving success in an increasingly competitive environment.’’

—Jay Liebowitz

As the baby boomer generation approaches retirement age, many organizations are facing the potential
...
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Focusing on the scientific aspect of network design, Practical Network Design Techniques uses mathematical models to illustrate important networking concepts and show how to solve many common design problems. Taking an inclusive approach, the author examines the cost and performance issues that can also be used by network analysts and designers as...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy