Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Human Rights Practices during Financial Crises
Human Rights Practices during Financial Crises
From the Great Depression in the twentieth century to the Great Recession in the twenty-first, systemic banking crises have been a recurring problem for both developing and developed countries. This book offers a human rights perspective on financial crises vis-à-vis low-income and least developed countries.  It systematically...
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results
Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results

The best-selling author of Big Data is back, this time with a unique and in-depth insight into how specific companies use big data.

Big data is on the tip of everyone's tongue. Everyone understands its power and importance, but many fail to grasp the actionable steps and resources required to utilise it effectively. This...

Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Data Mining with Computational Intelligence (Advanced Information and Knowledge Processing)
Nowadays data accumulate at an alarming speed in various storage devices,
and so does valuable information. However, it is difficult to understand information
hidden in data without the aid of data analysis techniques, which
has provoked extensive interest in developing a field separate from machine
learning. This new field is
...
Europe in Crisis: Bolt from the Blue?
Europe in Crisis: Bolt from the Blue?

This book analyzes the European Great Recession of 2008-12, its economic and social causes, its historical roots, and the policies adopted by the European Union to find a way out of it. It contains explicit debates with several economists and analysts on some of the most controversial questions about the causes of the crisis and the policies...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Answers to your most pressing SOA development questions

How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound...

NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy