Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing SCADA Application Software: A Practical Approach
Designing SCADA Application Software: A Practical Approach

Automation systems, often referred to as SCADA systems, involve programming at several levels; these systems include computer type field controllers that monitor and control plant equipment such as conveyor systems, pumps, and user workstations that allow the user to monitor and control the equipment through color graphic displays. All of the...

Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Packet Guide to Core Network Protocols
Packet Guide to Core Network Protocols

Trying to find the perfect networking resource or textbook can be a real challenge. Sometimes they are extremely focused on one technology, and thus miss the mark. Or they are extremely broad, covering every networking idea known to man. This book is about something that all networks have in common—the core protocols. Networks...

Great Communication Secrets of Great Leaders
Great Communication Secrets of Great Leaders

Leaders who communicate properly and frequently—in good times as well as bad—improve performance, get results, and create a successful enterprise. In this groundbreaking guide, top leadership consultant, visionary, and coach John Baldoni explores the leadership communication styles of many of the world’s most influential...

Pivot Table Data Crunching (Business Solutions)
Pivot Table Data Crunching (Business Solutions)
Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author ...
Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Guide to Cloud Computing: Principles and Practice (Computer Communications and Networks)
Guide to Cloud Computing: Principles and Practice (Computer Communications and Networks)

This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through the process of building and configuring a cloud environment. The book not only considers the technologies for designing and creating cloud computing platforms, but also the business models and frameworks in real-world...

Programming Microsoft Windows CE .NET, Third Edition
Programming Microsoft Windows CE .NET, Third Edition

Design sleek, high-performance applications for the newest smart mobile devices with the industry’s most respected reference to Windows CE .NET. Now in its third edition, this essential guide has been updated for Windows CE .NET 4.2 and the Microsoft .NET Compact Framework. Author Douglas Boling expertly demonstrates how to apply your...

Switching to VoIP
Switching to VoIP

More and more businesses today have their receive phone service
through Internet instead of local phone company lines. Many
businesses are also using their internal local and wide-area
network infrastructure to replace legacy enterprise telephone
networks. This migration to a single network carrying voice
...

Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started

Become a Linux sysadmin and expert user of Linux, even with no previous Linux experience and learn to manage complex systems with ease.  Volume 1 of this three volume training course introduces operating systems in general and Linux in particular. It briefly explores the The Linux Philosophy for SysAdmins in preparation for the...

Writing Mobile Code : Essential Software Engineering for Building Mobile Applications
Writing Mobile Code : Essential Software Engineering for Building Mobile Applications

Mobile computing devices have evolved from fixed-purpose communications tools to compelling and extensible mass-market computing platforms. Now, they stand poised to offer truly ubiquitous and mobile computingand to revolutionize the way people work, communicate, and interact with the world around them.

...
unlimited object storage image
Result Page: 147 146 145 144 143 142 141 140 139 138 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy