Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Writing Effective Use Cases
Writing Effective Use Cases
Writing use cases as a means of capturing the behavioral requirements of software systems and business processes is a practice that is quickly gaining popularity. Use cases provide a beneficial means of project planning because they clearly show how people will ultimately use the system being designed. On the surface, use cases appear to be a...
Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Windows Media 9 Series by Example
Windows Media 9 Series by Example
Videographers can harness the potential that WM9 offers to deliver high-quality video and multimedia via DVD and over the Internet. Illustrated examples and tutorials demonstrate the basic functionality of WM9 as well as the options available to advanced users who wish to design new applications with the software development kit. Professional...
Law in a Digital World
Law in a Digital World
In Life on the Mississippi, Mark Twain described his lifelong fascination with the Mississippi River and with the influence that the river had on the people and towns in the surrounding area. Through a series of stories and anecdotes about river life, Twain portrays the river not simply as a moving body of water, as a geographical entity, but as a...
Palm OS Programming
Palm OS Programming
The PalmOS is the most widely-distributed operating system for handheld computers, with tens of millions of devices in use worldwide. Palm has a thriving developer community, with over 350,000 registered developers and countless hobbyist developers. The new edition of PalmOS Programming introduces the many updates to the PalmOS operating system...
Web Engineering: Principles and Techniques
Web Engineering: Principles and Techniques
Since the advent of the Web, every aspect of our lives and organizational activities has changed dramatically. Organizations’ expectations and dependencies on the use of Web technologies have increased rapidly over the years. Most organizations have conceived these Web technologies as a critical instrument for enhancing their performance;...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Beginning C# 2008: From Novice to Professional, Second Edition
Beginning C# 2008: From Novice to Professional, Second Edition
This book is for anyone who wants to write good C# code—even if you have never programmed before. Writing good code can be a challenge—there are so many options, especially in a .NET language like C#. If you want to really get the best from a programming language, you need to know which features work best in which situations and...
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM)
No two data quality projects are the same. Some are large efforts focused entirely on improving some quality aspect of information. Others are subprojects within other efforts, such as a data migration. Still others are led by a few individuals trying to make a difference as they perform their everyday activities. What I like about McGilvray's Ten...
Serious Performance Consulting According to Rummler
Serious Performance Consulting According to Rummler

Praise for Serious Performance Consulting According to Rummler

"Before there was 'lean,' before there was TQM, before there was knowledge management, and before there were any one-minute cures, there was Geary Rummler preaching and practicing performance technology. With Serious...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

unlimited object storage image
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy