 |
|
 Programming With Visibroker : A Developer's Guide to Visibroker for JavaCoauthored by the lead architect for the VisiBroker Java ORB, this is the authoritative guide to programming with VisiBroker for Java. Designed to help Java developers quickly master the skills they need to develop more powerful and sophisticated distributed, object-oriented, client/server systems from scratch or by combining existing... |  |  eBay For Dummies (Computer/Tech)Buy low, sell high, and join the eBay community
Economy shopper or entrepreneur — discover the secrets to eBay success!
The bucks start here! Whether you're saving them or earning them, eBay's the place, and Marsha Collier is the person to show you how. Get... |  |  Redesigning Enterprise Processes for E-Business w/CD ROMThis is the decade of redesigning enterprise processes for e-business ! Creating a process advantage has always been a formidable strategic weapon for business enterprises, but the internet and e-business have brought new urgency to it. A different form of business process redesign or reengineering (BPR) has been ignited by e-business to create... |
|
|
 SAP GRC For Dummies (Computer/Tech)Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole... |  |  IT Service Management Guide: Vol. 1The importance of IT Service Management is becoming widely recognized. Whereas in the 1960s and 1970s interest was still focused mainly on the improvement of hardware, and whereas the development of software was the major concern until well into the 1980s, the 1990s was the decade that saw the rise of service management.
For decades,... |  |  Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |
|
|
| Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |