Home | Amazing | Today | Tags | Publishers | Years | Search 
Project Risk Management Guidelines : Managing Risk in Large Projects and Complex Procurements
Project Risk Management Guidelines : Managing Risk in Large Projects and Complex Procurements
This book describes the philosophy, principles, practices and techniques for managing risk
in projects and procurements, with a particular focus on complex or large-scale project
activities. The approaches contained here may also be applied to simple purchases of goods
and services, although with considerable simplification.
...
Delivering Business Intelligence with Microsoft SQL Server 2005
Delivering Business Intelligence with Microsoft SQL Server 2005
Transform disparate enterprise data into actionable business intelligence

Put timely, mission-critical information in the hands of employees across your organization using Microsoft SQL Server 2005 and the comprehensive information in this unique resource. Delivering Business Intelligence with Microsoft SQL Server...

A Practical Approach to WBEM/CIM Management
A Practical Approach to WBEM/CIM Management

System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,...

Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
Sams Teach Yourself Red Hat Linux Fedora in 24 Hours
An easy-to-understand, step-by-step guide and starter kit to help beginners install, configure, and use the latest version of Linux. Updated to cover the latest major release of Red Hat Linux, expected fall, 2003. Red Hat Linux is the most popular choice among Linux users in the U.S., with about 85% of the U.S. Linux market. Assumes no prior...
Market Neutral Strategies
Market Neutral Strategies
An inside view of what makes market neutral strategies tick and how they can be implemented

Market neutral strategies have gained attention for their potential to deliver positive returns regardless of the direction of underlying markets. As these strategies have built a record of good performance in recent years, their benefits have become...

Well-Posed Linear Systems (Encyclopedia of Mathematics and its Applications)
Well-Posed Linear Systems (Encyclopedia of Mathematics and its Applications)
This main purpose of this book is to present the basic theory of well-posed
linear systems in a form which makes it available to a larger audience, thereby
opening up the possibility of applying it to a wider range of problems. Up to
now the theory has existed in a distributed form, scattered between different
papers with
...
Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think
Just Say No to Microsoft: How to Ditch Microsoft and Why It's Not as Hard as You Think
Just Say No to Microsoft begins by tracing Microsoft's rise from tiny software startup to monopolistic juggernaut and explains how the company's practices over the years have discouraged innovation, stunted competition, and helped foster an environment ripe for viruses, bugs, and hackers. Readers learn how they can dump Microsoft...
Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to...
Flash 8 ActionScript Bible
Flash 8 ActionScript Bible

To create Flash applications that sizzle, you have to learn the code. In this comprehensive guide to the latest version of ActionScript, the object-oriented scripting language for Macromedia Flash, you'll get the detailed instruction and step-by-step tutorials you need to write robust code and create sophisticated interactive animations. Work...

Solaris Security
Solaris Security
At last, a security book just for Solaris and UNIX(r) system administrators. Learn
the specifics for making your system secure, whether it's an organization-wide
network or a standalone workstation. Expert author Peter Gregory has managed
security for everything from top-secret corporate research facilities to casinos.
...
Wicked Cool Java : Code Bits, Open-Source Libraries, and Project Ideas
Wicked Cool Java : Code Bits, Open-Source Libraries, and Project Ideas
Wicked Cool Java contains 101 fun, interesting, and useful ways to get more out of Java. This isn't intended as a Java tutorial--it's targeted at developers and system architects who have some basic Java knowledge but may not be familiar with the wide range of libraries available. Full of example code and ideas for combining them in useful...
Search Engine Optimization For Dummies, Second Edition (Computer/Tech)
Search Engine Optimization For Dummies, Second Edition (Computer/Tech)
Build sites search engines love, and see your business boom

Find out how to make your site pop to the top when the search is on

Search engines, search directories, search systems – it’s enough to make you search for antacids! Well, relax – this book not only tells you which is which, it gives you the inside track...

Result Page: 2441 2440 2439 2438 2437 2436 2435 2434 2433 2432 2431 2430 2429 2428 2427 2426 2425 2424 2423 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy