 |
|
 UML for Developing Knowledge Management SystemsThis book came from a need to establish a way to capture knowledge that can be easily translated into a computer program. To do this I wanted to establish a methodology or framework that would assist me. This framework must be a reusable method for getting this done. However, what should this framework contain? The first thing I wanted to be able... |  |  Designing Successful e-Learning, Michael Allen's Online Learning Library“The theoretical literature on learning and growth can be difficult to master and even more challenging to integrate into e-learning, but Michael has made this easy for all of us. He explains this thinking in clear and accessible language, amplifies the theories with research results, and describes popular approaches by applying these... |  |  Special Edition Using SOAPThis book will introduce the reader to SOAP and serve as a comprehensive reference to both experienced and new developers in the area. Only one other book completely dedicated to SOAP is currently on the market, and it has strong sales because no other information is available. SE Using SOAP will capture more readers than the competition because it... |
|
|
 Wireless Security Essentials: Defending Mobile Systems from Data PiracyProtect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,... |  |  Windows Server 2008 Hyper-V UnleashedHyper-V is Microsoft’s server virtualization technology built-in to Windows Server 2008. Virtual Machine Manager 2008 is a System Center add-on that helps organizations better manage their virtual guest images, delegate administration and management, and even extract virtual images from existing physical and virtual servers. This... |  |  |
|
 Handbook of Mathematical Formulas and Integrals, Fourth EditionThis book contains a collection of general mathematical results, formulas, and integrals that occur throughout applications of mathematics. Many of the entries are based on the updated fifth edition of Gradshteyn and Ryzhik’s ”Tables of Integrals, Series, and Products,” though during the preparation of the book, results were also... |  |  The Twofish Encryption Algorithm: A 128-Bit Block CipherThe first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES... |  |  SAP GRC For Dummies (Computer/Tech)Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole... |
|
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 |