Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Payment
Mobile Payment

Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers.

The book comprehensively describes current status, trends...

Branded Customer Service : The New Competitive Edge
Branded Customer Service : The New Competitive Edge

By applying the concepts in this book, organizations can use customer service as a powerful tool for establishing and maintaining a distinct brand identity.


Branding is an integral part of modern business strategy. But while there are dozens of books on branding products and marketing campaigns, nobody has applied the...

Smalltalk, Objects, and Design
Smalltalk, Objects, and Design
This reference and text treats the Smalltalk programming system and the web of object-oriented ideas within and around it. Thus it is more than a guide to the language; it also examines Smalltalk in its technical and historical setting, and along the way addresses the questions that every Smalltalk developer sooner or later naturally wonders about....
Psychological Aspects of Cyberspace: Theory, Research, Applications
Psychological Aspects of Cyberspace: Theory, Research, Applications

Hundreds of millions of people across the world use the Internet every day. Its functions vary, from shopping and banking to chatting and dating. From a psychological perspective, the Internet has become a major vehicle for interpersonal communication that can significantly affect people's decisions, behaviors, attitudes and emotions....

Java 9 Programming Blueprints
Java 9 Programming Blueprints

Key Features

  • See some of the new features of Java 9 and be introduced to parts of the Java SDK
  • This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
  • Take advantage of Java's new modularity features to write...
Japan's Great Stagnation: Financial and Monetary Policy Lessons for Advanced Economies
Japan's Great Stagnation: Financial and Monetary Policy Lessons for Advanced Economies
After experiencing spectacular economic growth and industrial development for much of the postwar era, Japan plunged abruptly into recession in the early 1990s and since then has suffered a prolonged period of economic stagnation, from which it is only now emerging. Japan's malaise, marked by recession or weak economic activity, commodity and asset...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks

Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization – are vital to modern services such as...

Neural Networks
Neural Networks

Neural networks represent a powerful data processing technique that has reached maturity and broad application. When clearly understood and appropriately used, they are a mandatory component in the toolbox of any engineer who wants make the best use of the available data, in order to build models, make predictions, mine data, recognize shapes...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook
Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook
Database professionals will find that this new edition aids in mastering the latest version of Microsofts SQL Server. Developers and database administrators (DBAs) use SQL on a daily basis in application development and the subsequent problem solving and fine tuning. Answers to SQL issues can be quickly located helping the DBA or developer optimize...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy