Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Networked Information Technologies: Diffusion and Adoption
Networked Information Technologies: Diffusion and Adoption
Software systems that used to be relatively autonomous entities such as e.g. accounting systems, order-entry systems etc. are now interlinked in large networks comprising extensive information infrastructures. What earlier used to be stand-alone proprietary systems are now for the most part replaced by more or less standardized interdependent...
Industrial Applications of Semantic Web: Proceedings of the 1st International IFIP/WG12.5
Industrial Applications of Semantic Web: Proceedings of the 1st International IFIP/WG12.5
The Semantic Web, that adds a conceptual layer of machine-understandable metadata to the existing content, will make the content available for processing by intelligent software allowing automatic resource integration and providing interoperability between heterogeneous systems. The Semantic Web is now the most important influence on the...
The Jossey-Bass Academic Administrator's Guide to Budgets and Financial Management
The Jossey-Bass Academic Administrator's Guide to Budgets and Financial Management

Newly appointed academic managers are often unsure how to effectively manage their department's fiscal affairs. The Jossey-Bass Academic Administrator's Guide to Budgets and Financial Management is specifically designed for administrators who need guidance for managing the fiscal resources of a department or unit. Using this...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Mastering Embedded Linux Programming
Mastering Embedded Linux Programming

Key Features

  • Create efficient and secure embedded devices using Linux
  • Minimize project costs by using open source tools and programs
  • Explore each component technology in depth, using sample implementations as a guide

Book Description

Mastering Embedded Linux...

Hands-On Enterprise Java Microservices with Eclipse MicroProfile: Build and optimize your microservice architecture with Java
Hands-On Enterprise Java Microservices with Eclipse MicroProfile: Build and optimize your microservice architecture with Java

An effective guide to designing, building, and deploying enterprise Java microservices with Eclipse MicroProfile

Key Features

  • Create cloud-native microservices with ease using this detailed guide
  • Avoid vendor lock-in when implementing microservices using Eclipse...
Going Virtual: Distributed Communities of Practice
Going Virtual: Distributed Communities of Practice
This text describes how more subtle kinds of knowledge can be managed in a distributed international environment. It also describes work in the field of knowledge management, with a specific focus on the management of knowledge .

Going Virtual: Distributed Communities of Practice contributes to the understanding of how more...

The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media: Blurring the Lines Between Entertainment and Persuasion
The Psychology of Entertainment Media provides a cutting-edge look at how entertainment media affects its viewers, both in intended and unintended ways, and the psychological processes that underlie these effects. The collection represents an international, multidisciplinary investigation of an age-old process--persuasion--in a relatively...
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Professional Rich Internet Applications: AJAX and Beyond (Programmer to Programmer)
Now you can provide users with the same rich experience and functionality on the web that they've become accustomed to on the desktop computer. This book will show you how to take AJAX and Ruby on Rails to the next level by combining numerous cutting-edge technologies in order to develop full-fledged web applications. It explores a number of...
Perl Scripting for IT Security
Perl Scripting for IT Security
This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely...
Getting Started with Digital Imaging, Second Edition: Tips, tools and techniques for photographers
Getting Started with Digital Imaging, Second Edition: Tips, tools and techniques for photographers
Whether you are using a digital compact or dSLR camera to shoot, or a Mac or PC to manipulate your images, Joe Farace explains what products are out thereand how to use them to get the best shots.

While most books offer photographers tips and tricks for working with the latest software package, this book offers a new approach to working
...
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Computer Engineering and Information Sciences.

Innovations and Advanced Techniques in...

unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy