Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Microsoft Dynamics GP 2010 Reporting
Microsoft Dynamics GP 2010 Reporting

Microsoft Dynamics GP 2010 is a sophisticated Enterprise Resource Planning (ERP) system with a multitude of features and options. Microsoft Dynamics GP enables you to create and manage a variety of reports that help small and mid-size businesses effectively manage their financial and operational data.

This book will show you how to...

Enterprise Service Computing: From Concept to Deployment
Enterprise Service Computing: From Concept to Deployment

The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its...

Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)

We are deluged by data—scientific data, medical data, demographic data, financial data, and marketing data. People have no time to look at this data. Human attention has become a precious resource. So, we must find ways to automatically analyze the data, to automatically classify it, to automatically summarize it, to...

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

This book is about expanding Internet business risk management strategies into resilience such as software diversity; into financial risk transfer instruments such as insurance policies, catastrophe bonds, performance bonds, and self-insurance as in Basel II; and into reputation systems.

Traditional Internet performance and...

Core Concepts of Accounting Information Systems
Core Concepts of Accounting Information Systems

Information technologies impact every aspect of accounting, including financial reporting, managerial accounting, auditing, and tax. The nature of the work done by accountants continues to evolve as these technologies advance. For example, less than 30 years ago, accountants could have spent much of their day footing ledgers and making...

Leading the Virtual Workforce: How Great Leaders Transform Organizations in the 21st Century
Leading the Virtual Workforce: How Great Leaders Transform Organizations in the 21st Century

As it turns out Bennis underestimated the impact that bad leadership can have. A combination of greed, hubris, flawed judgment, and miscalculation has made the Enron debacle seem almost quaint by comparison to the global financial crisis that we now face. Although numerous pundits and scholars have advanced many reasons for the...

Data Analysis and Classification: Proceedings of the 6th Conference
Data Analysis and Classification: Proceedings of the 6th Conference

This volume contains revised versions of selected papers presented at the biennial meeting of the Classification and Data Analysis Group (CLADAG) of the Italian Statistical Society, which was held in Macerata, September 12–14, 2007. Carlo Lauro chaired the Scientific Programme Committee and Francesco Palumbo chaired the Local...

jQuery Mobile
jQuery Mobile

Mobile applications come in two basic flavors: native applications, which are compiled programs that run natively on the device, and mobile web applications, which run inside a web browser on the device.

Native applications get almost all of the press these days, especially given the financial success of the iTunes App Store...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management
Data Mining Techniques: For Marketing, Sales, and Customer Relationship Management

Fifteen years ago, Michael and I wrote the first version of this book. A little more than 400 pages, the book fulfilled our goal of surveying the field of data mining by bridging the gap between the technical and the practical, by helping business people understand the data mining techniques and by helping technical people understand the...

Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy