Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Creating Web Sites Bible
Creating Web Sites Bible

Build your business or personal Web site in a 2.0 world

If you want to build your own Web site in a 2.0 world, you've come to right place. From facing HTML without fear to adding new ?air with multimedia, interactivity, and blogging, this comprehensive guide provides you with everything you need....

High Performance Data Network Design (IDC Technology)
High Performance Data Network Design (IDC Technology)
The proliferation and complexity of data networks today is challenging our ability to design and manage them effectively. A new generation of Internet, e-commerce, and multimedia applications has changed traditional assumptions on traffic dynamics, and demands tight quality of service and security guarantees. These issues, combined with the...
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Microsoft Data Mining: Integrated Business Intelligence for e-Commerce and Knowledge Management
Data mining exploits the knowledge that is held in the enterprise data store by examining the data to reveal patterns that suggest better ways to produce profit, savings, higher-quality products, and greater customer satisfaction. Just as the lines on our faces reveal a history of laughter and frowns, the patterns embedded in data reveal a history...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
The Culturally Customized Web Site: Customizing Web Sites for the Global Marketplace
The Culturally Customized Web Site: Customizing Web Sites for the Global Marketplace
In The Culturally Customized Web Site, Nitish Singh and Arun Pereira focus on cultural aspects of international website design, honing in on three objectives:

* First, to present a review and survey results on standardization/localization issues on the web
* Second, to present a scientifically tested framework to design culturally
...
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control (Data Management Systems)
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control (Data Management Systems)

Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting...

Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • The Art of Strategic Planning for Information Technology, 2nd Edition
    The Art of Strategic Planning for Information Technology, 2nd Edition
    The acclaimed IT strategic planning methodology now completely revised for the new millennium!

    Bernard Boar, internationally recognized expert and IT consultant for Fortune 500 companies, overhauls his bestselling book on IT strategy to help IT professionals take on the new challenges of the hyper-competitive digital age. From assessing your...

    Hactivism and Cyberwars: Rebels with a Cause
    Hactivism and Cyberwars: Rebels with a Cause
    This detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism...
    Going Wireless: Transform Your Business with Mobile Technology
    Going Wireless: Transform Your Business with Mobile Technology
    Going Wireless delivers the unexpected by showing how wireless is transforming every type of enterprise from micro-businesses to multi-national conglomerates.

    Award-winning technology journalist Jaclyn Easton begins with an in-depth look at owning your customers and clients through mobile commerce -- whether your company focuses on...

    Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy