Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Your Financial Action Plan: 12 Simple Steps to Achieve Money Success
Your Financial Action Plan: 12 Simple Steps to Achieve Money Success

While three out of five Americans believe they are in control of their personal finances, the same number of people are not sure of such essential things as how much life, auto, or health care insurance they should carry. In today’s fast-paced and ever-changing world, making personal finance decisions is harder than ever–especially...

QuickBooks 2006: The Missing Manual
QuickBooks 2006: The Missing Manual
f your company is ready to minimize paperwork and maximize productivity, control spending and boost sales, QuickBooks 2006 can help you make it happen--but only if you know how to use it. And it doesn't come with a manual. Lucky for you, there's QuickBooks 2006: The Missing Manual, the comprehensive, up-to-date...
Voice User Interface Design: Moving from GUI to Mixed Modal Interaction
Voice User Interface Design: Moving from GUI to Mixed Modal Interaction
This is 2019. The year becomes significant when we start talking technological advancements and their effects as we move forward. Every year, we see something new, something that has the potential to change technology forever. But as American fiction author William Gibson puts it aptly, “The future is already here; it is...
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face.

Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to...

Web Commerce Security: Design and Development
Web Commerce Security: Design and Development

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.

Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during...

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

The Internet connects millions of people around the world and allows for immediate communication and access to a seemingly limitless amount of information. Data, video, and voice, almost every single type of communication, travels across the Internet. Some of this communication is private.

The language...

Case Studies In Knowledge Management
Case Studies In Knowledge Management
Knowledge Management (KM) has been growing in importance and popularity
as a research topic since the mid 1990s. This is sufficient time for many organizations
to implement KM initiatives and KM systems (KMS). This book presents twenty cases
investigating the implementation of KM in a number of business and industry settings
and
...
J2EE Best Practices: Java Design Patterns, Automation, and Performance
J2EE Best Practices: Java Design Patterns, Automation, and Performance
Learn how to apply robust application design to your J2EE projects

There are a number of best practices you need to consider to build highly effective J2EE components and integrate them into applications. These practices include evaluating and selecting the right set of software components and services to handle the job....

Oracle Performance Tuning for 10gR2, Second Edition
Oracle Performance Tuning for 10gR2, Second Edition
A completely revised version containing updates through to Oracle10gR2. Still includes from 9i to 10gR2.
Oracle Performance Tuning for 10gR2, Second Edition

Gavin JT Powell
Independent Consultant and Oracle Certified Professional, U.S.A.

KEY FEATURES:
Fully updated for version 10gR2 and provides all necessary
...
Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Manager's Guide to Compliance
Manager's Guide to Compliance
"Wide perspectives and best practices combined deliver a punch that will knock your 'SOX' off! The author has blended together a critical mix necessary for effectively handling the requirements of SOX."
—Rob Nance, Publisher, AccountingWEB, Inc.

"Robust compliance and corporate governance is an absolute necessity...

Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more
Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more
Since the development of the relational model by E. F. Codd at IBM in 1970, relational databases have become the de facto standard for managing and querying structured data. The rise of the Internet, online transaction processing, online banking, and the ability to connect heterogeneous systems have all contributed to the massive growth in data...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy