Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Professional Microsoft Windows Embedded CE 6.0 (Wrox Programmer to Programmer)
Windows Embedded CE is a 32 - bit, native, hard, real - time, small - footprint operating system developed by Microsoft to address the needs of handheld, mobile, and embedded devices. With support for multiple processor architectures, Windows Embedded CE can be adapted to a variety of devices like Smartphones, PocketPCs, set - top boxes, thin -...
Business Restructuring: An Action Template for Reducing Cost and Growing Profit
Business Restructuring: An Action Template for Reducing Cost and Growing Profit

An effective, long-term strategy for maintaining corporate growth, profit and competitive edge

Depicting a progressive emergent framework for long-term growth, profitability, and success, Business Restructuring: An Action Template for Reducing Cost and Growing Profit employs an integrated approach incorporating several of...

Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Patterns for e-business
Patterns for e-business
Get an inside look at how successful businesses build their e-business architectures. In this book, four IBM e-business experts capture years of experience into easy-to-follow guidelines. Deliberately focusing on Business patterns, Integration patterns, and Application patterns, the authors share with you proven architectural patterns that can help...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

PMP: Project Management Professional Exam Study Guide, Includes Audio CD
PMP: Project Management Professional Exam Study Guide, Includes Audio CD

Prepare for the Latest Project Management Professional Exam

Prepare for the latest Project Management Professional (PMP®) certification exam with this new edition of the PMP Study Guide, which covers all essential procedures and concepts from A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fourth Edition....

Multisite Commerce: Proven Principles for Overcoming the Business, Organizational, and Technical Challenges
Multisite Commerce: Proven Principles for Overcoming the Business, Organizational, and Technical Challenges

Plan, Manage, and Architect Multiple Web Sites for Maximum Efficiency and Business Value

 

For many companies, one Web site is no longer enough. Business strategy requires multiple Web sites, each with carefully targeted audiences and marketing...

Engineering Design via Surrogate Modelling: A Practical Guide
Engineering Design via Surrogate Modelling: A Practical Guide
Think of a well-known public personality whom you could easily identify from a photograph. Consider now whether you would still recognize them if most of the photograph was obscured, except for the corner of an eye, a small part of their chin and, perhaps, a half of their mouth. This is a game often played on television quiz shows...
Microeconomics (7th Edition)
Microeconomics (7th Edition)

KEY BENEFIT: This book is well known for its coverage of modern topics (Game theory, Economics of Information, and Behavioral Economics), clarity of its writing style and graphs, and integrated use of real world examples.

KEY TOPICS: The emphasis on relevance and application to...

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
The book consists of a collection of works on utilising the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID...
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
“a comprehensive overview of both DDS architectures and fractional-N frequency synthesizers.” Microwave Journal said this book “is aimed specifically at practical designers and utilizes many intuitive explanations and design examples.” Microwaves & RF magazine

"Bar-Giora Goldberg should
...
unlimited object storage image
Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy