Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Concepts with Code: An Approach for Developers
Design Concepts with Code: An Approach for Developers

This book is all about getting developers to realize good, solid interface design for their products by considering a reasonable set of design axioms. Design Concepts with Code: An Approach for Developers shows how you can create design through code by using technologies such as SVG, XHTML, XML, XSLT, and XSL-FO. It explores how, by...

Project Management: A Systems Approach to Planning, Scheduling, and Controlling
Project Management: A Systems Approach to Planning, Scheduling, and Controlling

This revised edition of the bestselling project management “bible” offers a new, focused presentation of the critical aspects of project management. Written by one of the best-known and respected authorities on the subject, this extraordinary book gives the leaders of today and tomorrow a profound understanding of project...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Introduction to Digital Professional Mobile Radio (Artech House Mobile Communications Library)
Introduction to Digital Professional Mobile Radio (Artech House Mobile Communications Library)
Offering unique insight from the author's years of experience working with this technology, the book presents a comparison of the properties of conventional analogue and new digital PMR systems.

This practical new book is written for mobile communication professionals who are involved in the planning, design, testing,
...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
Programming Microsoft Dynamics NAV 2009
Programming Microsoft Dynamics NAV 2009
Microsoft Dynamics NAV is a well established Enterprise Resource Planning (ERP) application, part of the Microsoft Dynamics family. Dynamics NAV is installed worldwide, with well over one million users. Version 2009 contains many major new features and structures, requiring even experienced Dynamics NAV developers to refresh their NAV development...
The People CMM: A Framework for Human Capital Management (2nd Edition)
The People CMM: A Framework for Human Capital Management (2nd Edition)

Organizations are now competing in two markets, one for their products and services and one for the talent required to produce or perform them. Success in the former is determined by success in the latter. The ability to compete is directly related to the ability to attract, develop, motivate, organize, and retain the...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Beginning Windows 8 Data Development: Using C# and JavaScript (Expert's Voice in Windows)
Beginning Windows 8 Data Development: Using C# and JavaScript (Expert's Voice in Windows)

This book introduces novice developers to a range of data access strategies for storing and retreiving data both locally and remotely. It provides you with a range of fully working data access solutions and the insight you need to know when, and how, to apply each of the techniques to best advantage.

Focussing specifically on how...

Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Interactive Project Management: Pixels, People, and Process (Voices That Matter)
Interactive Project Management: Pixels, People, and Process (Voices That Matter)

As an industry, interactive is different. The work entails elements of software development, marketing, and advertising, yet it’s neither purely technical nor traditional “agency” work. Delivery methods are different, and because the industry is relatively new, the gap in understanding between the clients buying the work and...

unlimited object storage image
Result Page: 217 216 215 214 213 212 211 210 209 208 207 206 205 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy