 |
|
|
 Enterprise Systems Education in the 21st CenturyIT education, particularly at business colleges, is undergoing a transformation because of the emerging federated systems or enterprise-wide systems (ES). This follows a trend in industry, which uses complex software applications like SAP and others. This movement toward ES in industry has created major challenges for integrating ES into the... |  |  Numerical Polynomial AlgebraThis first book on the numerical analysis of polynomial systems is a stepping stone at the interface of symbolic computation and numerical computation. Bernard Sturmfels, Department of Mathematics, University of Berkeley
I am not familiar with any books that do such a careful job of combining numerical analysis with the algebra of... |  |  Open Source: Technology and Policy"Provide[s] a well laid out review of the open source movement, including its technologies, policies, and impact and implications.... Overall, this book ties together the many interlocking pieces within the development and history of the open source movement." -- A. Hollister, State University of Cortland, CHOICE
The open... |
|
 Information Assurance: Managing Organizational IT Security RisksWritten by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted... |  |  Flash 3D: Animation, Interactivity, and GamesPush your creative ideas to the next level in content delivery. Use real and simulated 3D space in your Flash games and interactive systems.
3D possibilities offer an untapped creative approach to thinking and designing with Flash. Tap into this medium by: * Creating reusable templates to reduce costs and cycle time for... |  |  |
|
 |  |  Information Operations PlanningInformation operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with... |  |  Computer Architecture, Fourth Edition: A Quantitative Approach
The era of seemingly unlimited growth in processor performance is over: single chip architectures can no longer overcome the performance limitations imposed by the power they consume and the heat they generate. Today, Intel and other semiconductor firms are abandoning the single fast processor model in favor of multi-core... |
|
Result Page: 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 |