Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age

With their ability to cross traditional boundaries and achieve a level of functionality greater than their component elements, mega-systems have helped corporations and government organizations around the world resolve complex challenges that they otherwise couldn’t address with stand-alone systems. Engineering Mega-Systems: The...

Formation Testing: Pressure Transient and Contamination Analysis
Formation Testing: Pressure Transient and Contamination Analysis

Traditional well logging methods, such as  resistivity, acoustic, nuclear and NMR, provide indirect information related to fluid and formation properties.  The “formation tester,” offered in wireline and MWD/LWD operations, is different.  It collects actual downhole fluid samples for surface analysis, and through...

Developing Time-Oriented Database Applications in SQL
Developing Time-Oriented Database Applications in SQL
What is everywhere but occupies no space; can be measured but not seen or touched; can be spent, wasted, or killed, but not destroyed or changed? The simple answer is time, and the relationship between the fourth dimension and data is the foundation for Developing Time-Oriented Database Applications in SQL, a fascinating book by Richard T....
Decompiling Java
Decompiling Java
WHEN COREL BOUGHT WordPerfect for almost $200 million from the Novell Corporation in the mid 1990s, nobody would have thought that in a matter of months they would have been giving away the source code free. However, when Corel ported WordPerfect to Java and released it as a beta product, a simple program called Mocha1 could...
Solving Enterprise Applications Performance Puzzles: Queuing Models to the Rescue
Solving Enterprise Applications Performance Puzzles: Queuing Models to the Rescue
Poorly performing enterprise applications are the weakest links in a corporation ’ s management chains, causing delays and disruptions of critical business functions. In trying to strengthen the links, companies spend dearly on applications tuning and sizing; unfortunately, the only deliverables of many of such ventures...
Enterprise Guide to Gaining Business Value from Mobile Technologies
Enterprise Guide to Gaining Business Value from Mobile Technologies
Proven strategies for integrating mobile technologies into your business to gain a competitive advantage

The rate at which companies are deploying wireless and mobile technology is astounding. But as the dot-com crash demonstrated, implementing solutions without clearly defined business requirements can lead to skyrocketing budgets and possible...

Dynamic Enterprise Architecture: How to Make It Work
Dynamic Enterprise Architecture: How to Make It Work
This book presents an approach to enterprise architecture, which enables corporations to achieve their business objectives faster. Focusing on the governance of IT in the organization, it provides tangible tools, advice and strategies for implementing and designing the architectural process within a corporation that will make a major contribution...
Database Design (Sams Teach Yourself)
Database Design (Sams Teach Yourself)
Database Design is the book you need to master the fundamentals of relational database design in today's ever-evolving world of database technologies. This book takes an approach to database design to teach the reader how to reach into the inner depths of an organization to understand the business needs, data, and daily processes that will all...
Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Special Edition Using WordPerfect 12
Special Edition Using WordPerfect 12

This must have reference on WordPerfect 12, is crammed full with tips, tricks, and practical examples not found anywhere else.

This is the most comprehensive and up-to-date book on the market today.

Title is backed and promoted by WordPerfect Universe (most popular WP site), and wpwriter.com (one of the top 3 WP web...

Frontiers in Biochip Technology
Frontiers in Biochip Technology
Frontiers in Biochip Technology

Dr. Wan-Li Xing and Dr. Jing Cheng

Frontiers in Biochip Technology serves as an essential collection of new research in the field of biochip technology. This comprehensive collection covers emerging technologies and cutting –edge research in...

Oracle Database Programming Using Java and Web Services
Oracle Database Programming Using Java and Web Services
The traditional division of labor between the database (which only stores and manages SQL and XML data for fast, easy data search and retrieval) and the application server (which runs application or business logic, and presentation logic) is obsolete. Although the books primary focus is on programming the Oracle Database, the concepts and...
unlimited object storage image
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy