Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Lightwave 3D Character Animation
Lightwave 3D Character Animation
This book is for anyone who has ever had a character in their heart that they’ve wanted to bring to life with as much fluidity, power, and grace as can be seen in the best animated feature films. This is a book for anyone who has wanted to become an animator but hasn’t gone to Sheridan College in Toronto or CalArts in Valencia. This is...
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)

The Easy, Example-Based Guide to Ajax for Every Web Developer

 

Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop

...

Real World Color Management, Second Edition
Real World Color Management, Second Edition
Every graphics professional worth his or her salt knows the importance of color management. No matter how much thought artist and client put into the color scheme for a given project, all of that work is for naught if you can't get your results to match your expectations. Enter Real World Color Management.

In this industrial-strength,...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

Game Engine Toolset Development
Game Engine Toolset Development
Toolset development is an extremely broad topic. Game Engine Toolset Development provides you with a core set of skills and a comprehensive insight that will aid you in the development of game engine utilities, significantly reducing the time period associated with the construction phase of a project. The book starts off with topics regarding...
SPSS For Dummies (Computer/Tech)
SPSS For Dummies (Computer/Tech)
Program SPSS with Python® and Command Syntax

The fun and easy way® to generate solid decision-making results with SPSS

Stymied by SPSS? This friendly, plain-English guide gets you up and running with the latest version of the software so that you can start performing calculations...

Design Recipes for FPGAs
Design Recipes for FPGAs
This book provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, the book gives easy-to-find design techniques and templates at all levels, together with functional code, which engineers can easily match and apply to their application.

The easy-to-find
...
The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
Influence: Gaining Commitment, Getting Results (Center for Creative Leadership)
Influence: Gaining Commitment, Getting Results (Center for Creative Leadership)

Influence is an essential component of leadership. Your position in an organization and the power it gives you aren’t always enough to motivate people to do what you ask. Developing your influence skills can help you gain commitment from people at all levels: direct reports, peers, and bosses.

This book includes an assessment tool...

unlimited object storage image
Result Page: 1327 1326 1325 1324 1323 1322 1321 1320 1319 1318 1317 1316 1315 1314 1313 1312 1311 1310 1309 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy