 |
|
|
|
 Working with Microsoft Dynamics(TM) CRM 3.0Get a practical, hands-on introduction to the fundamentals of adapting Microsoft CRM 3.0 to meet your specific business needs. With topics that include developing new functionality, designing implementations, and integrating Microsoft CRM with other business applications—including Microsoft Office OutlookЮ and Microsoft... |  |  IT Project Portfolio ManagementWhile consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors... |  |  Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
In February 2004, at the Universitat Polit`ecnica de Catalunya, we presented a
45-hour Advanced Course on Contemporary Cryptology, organised by the Centre
de Recerca Matem`atica. This volume is an expanded and unified version of the
material presented in the lectures and the background material that we distributed
among the... |
|
|
|
 Inside Microsoft Exchange Server 2007 Web ServicesDive deep into the architecture of Exchange Web Servicesand master the intricacies for accessing data with the new, unifying API. Exchange Web Services offers new functionality, replacing old, disparate APIs. This practical guide introduces developers to Exchange Web Services. It includes comprehensive, in-depth coverage of the architecture and key... |  |  Force.com Developer Certification Handbook (DEV401)
When migrating to the new wave of cloud-based applications, we now think about business logic, we think about automating processes, and we think about how we can make the systems better. Force.com is a cloud-based platform that is used to build and deploy enterprise applications on the cloud with minimum coding. Demand for Force.com experts... |  |  Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 |