Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Global Brand Strategy: Unlocking Brand Potential Across Countries, Cultures & Markets
Global Brand Strategy: Unlocking Brand Potential Across Countries, Cultures & Markets

In Global Brand Strategy, Sicco van Gelder tackles this central issue head on. He shows how both global and local brand management need to agree on a common basis for their brand strategy and planning. Drawing on his extensive experience, he has created a unique framework—the Global Brand Proposition Model—which enables them...

Kant's Search for the Supreme Principle of Morality
Kant's Search for the Supreme Principle of Morality
'... the author joins the discussion of the grounds for a moral theory that has preoccupied philosophers for some time, and advances that discussion significantly further. This is a book that will be required reading for those interested in that topic of Kant's moral theory.' Roger Sullivan, author of Immanuel Kant's Moral Theory and An...
Fundamentals of X Programming: Graphical User Interfaces and Beyond
Fundamentals of X Programming: Graphical User Interfaces and Beyond
This book provides an overview of the X Window System focusing on characteristics that have significant impact on the development of both application programs and widgets. We pay special attention to applications that go beyond graphical user interfaces (GUIs); therefore we discuss issues affecting video games, visualization and imaging programs,...
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
A scientific approach to the new field of critical infrastructure protection

This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve,...

Linux Network Architecture
Linux Network Architecture

This book deals with the architecture of the network subsystem in the Linux kernel. The idea for this book was born at the Institute of Telematics at the University of Karlsruhe, Germany, where the Linux kernel has been used in many research projects and its network functionality is modified or enhanced, respectively, in a...

DVD Demystified
DVD Demystified
"This is not merely ‘a’ good book to help you make sense of DVD, it is ‘the’ book that you will return to over and over as you explore and come to understand this exciting new optical media format." - Geoffrey Tully, Multimedia Technology Consultant; former Senior VP of Production, Divx Entertainment

DVD is...

Application Development Using C# and .NET
Application Development Using C# and .NET
Microsoft .NET is an advance in programming technology that greatly simplifies application development both for traditional, proprietary applications, and for the emerging paradigm of Web-based services. .NET is a complete restructuring of Microsoft's whole system infrastructure and represents a major learning challenge for programmers developing...
Expert .NET 2.0 IL Assembler
Expert .NET 2.0 IL Assembler

Expert .NET 2.0 IL Assember drills down into the internal structures and operations of the .NET common language runtime and teaches you how to master the IL assembly language, ILAsm. (The rule of thumb is that if the runtime can do it, ILAsm must be able to express it.) This book is ideal if you're a compiler and tool developer, a...

The PHP Anthology, Volume II: Applications
The PHP Anthology, Volume II: Applications
A compilation of best practice solutions to common Web Development problems in PHP, focusing on the achievement of practical goals by applying well-structured, object orientated software design principles.

Volume 2 covers the applications of PHP in the real world including authentication & access control, XML, stats & tracking, caching...

The Austin Protocol Compiler (Advances in Information Security)
The Austin Protocol Compiler (Advances in Information Security)

The TAP notation uses two types of semantics: an abstract semantics for protocol verifiers and a concrete semantics for protocol implementers. The Austin Protocol Compiler illustrates that two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the...

Fuzzy Equational Logic (Studies in Fuzziness and Soft Computing)
Fuzzy Equational Logic (Studies in Fuzziness and Soft Computing)
The present book deals with algebras, congruences, morphisms, reasoning about identities, classes of algebras and their axiomatizability, etc., from the point of view of fuzzy logic. We therefore deal with topics traditionally studied in universal algebra. Our approach is the following. In classical universal algebra, one works in bivalent setting....
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Declarative Programming for Knowledge Management: 16th International Conference on Applications of Declarative Programming and Knowledge Management, INAP
Knowledge means power – but only if it is available at the right time, the right place, and in the hands of the right people. Structured, engineered, repeatable methods to gather, transport, and apply knowledge are collectively called knowledge management.

Declarative programming strives for the ideal of programming by wish: the
...
unlimited object storage image
Result Page: 2296 2295 2294 2293 2292 2291 2290 2289 2288 2287 2286 2285 2284 2283 2282 2281 2280 2279 2278 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy