Home | Amazing | Today | Tags | Publishers | Years | Search 
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
Enterprise Information Systems: 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised
This book contains the carefully selected best papers of the 8th International Conference on Enterprise Information Sysetms, ICEIS 2006, held in Paphos, Cyprus, in May 2006.

The 4 invited papers and 27 revised and selected papers presented in this volume cover different aspects related to enterprise computing. They were selected from 63...

Continuum Theory (Lecture Notes in Pure and Applied Mathematics)
Continuum Theory (Lecture Notes in Pure and Applied Mathematics)
[A]ll of the appers of this volume have a consistent scientific value.
- Analele Stiintifice al Universitatii al I. Cuza

Celebrating the work of world-renowned mathematician Sam B. Nadler, Jr., this reference examines the most recent advances in the analysis of continua. The book offers articles on the contributions of Professor...

Software Metrics: A Guide to Planning, Analysis, and Application
Software Metrics: A Guide to Planning, Analysis, and Application
The modern field of software metrics emerged from the computer modeling and "statistical thinking" services of the 1980s. As the field evolved, metrics programs were integrated with project management, and metrics grew to be a major tool in the managerial decision-making process of software companies. Now practitioners in the software...
E-Business Innovation and Change Management
E-Business Innovation and Change Management
Demonstrating how organizations around the world are capitalizing on new technologies such as the Internet and the World Wide Web to develop e-business, this book shows how evolving e-business models, integrated solutions, and improved technological infrastructure are continuously changing the way business is conducted. This discusses the ways in...
Designing Network Security (2nd Edition) (Networking Technology)
Designing Network Security (2nd Edition) (Networking Technology)
Master the design of secure networks with the updated edition of this best-selling security guide

* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs
* Learn how to use new and legacy Cisco Systems equipment to secure your networks
* Understand how
...

Storage Network Performance Analysis
Storage Network Performance Analysis
Your in-depth guide to analyzing and fine-tuning storage area network performance

Here, for the first time, is your complete resource for optimizing SAN performance and reliability in your organization. Whether you need to evaluate an existing system or design one from the ground up, this book provides a comprehensive, vendor-neutral collection...

Credit Portfolio Management
Credit Portfolio Management
Market realities have forced many financial institutions (and will force many others in the future) to change the way they manage their portfolios of credit assets. Evidence of this change can be seen in the rapid growth of secondary loan trading, credit derivatives, and loan securitizations. Less obvious–but far more important–is the...
Crash Profits: Make Money When Stocks Sink and Soar!
Crash Profits: Make Money When Stocks Sink and Soar!
If continuing corporate collapses, Wall Street lies, and economic uncertainties have left you wondering whom to trust and what to do with your hard-earned money, the time to take action is now. Immediately stop any losses, get on a fast track to recovery, and potentially make more money in the next few years than most investors made in the 1990s....
Balancing Agility and Discipline: A Guide for the Perplexed
Balancing Agility and Discipline: A Guide for the Perplexed
Agility and discipline: These apparently opposite attributes are, in fact, complementary values in software development. Plan-driven developers must also be agile; nimble developers must also be disciplined. The key to success is finding the right balance between the two, which will vary from project to project according to the circumstances and...
E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

How to Do Everything: Mac
How to Do Everything: Mac
Congratulations are in order! Chances are good that if you’ve purchased this book you either own or soon will own a Mac, and that is always a good thing. If you are using a computer for the first time, your experience will be light years beyond that of your friend or family member who started out with a PC. If you are a seasoned PC user, the...
The CISM Prep Guide: Mastering the Five Domains of Information Security Management
The CISM Prep Guide: Mastering the Five Domains of Information Security Management

There is no better way for you to stand out from the crowd of IT professionals than to get your Certified Information Security Manager (CISM) certification from the Information Systems Audit and Control Association (ISACA). Written by the bestselling authors of the CISSP Prep Guide, this comprehensive test guide provides you with all...

Result Page: 2294 2293 2292 2291 2290 2289 2288 2287 2286 2285 2284 2283 2282 2281 2280 2279 2278 2277 2276 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy