Home | Amazing | Today | Tags | Publishers | Years | Search 
M Commerce: Technologies, Services, and Business Models
M Commerce: Technologies, Services, and Business Models
Presenting the first book ever to provide a complete introduction to m-Commerce!

Mobile Commerce, or m-Commerce, is part of an explosion of new usage scenarios that overcome the limitations of mobile devices in support of highly personalized and time-critical activities for consumers and enterprises alike. With tens of millions
...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Multimedia Signal Processing: Theory and Applications in Speech, Music and Communications
Multimedia Signal Processing: Theory and Applications in Speech, Music and Communications
Multimedia Signal Processing is a comprehensive and accessible text to the theory and applications of digital signal processing (DSP).  The applications of DSP are pervasive and include multimedia systems, cellular communication, adaptive network management, radar, pattern recognition, medical signal processing, financial data...
Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
Trends in Functional Programming 6
Trends in Functional Programming 6
This book contains selected papers from the proceedings presented at the Sixth Symposium on Trends in Functional Programming (TFP05). Continuing the TFP series with its previous instances held in Stirling (1999), St. Andrews (2000), Stirling (2001), Edinburgh (2003) and Munich (2004) the symposium was held in Tallinn, Estland in co-location with...
Guerilla Data Analysis Using Microsoft Excel
Guerilla Data Analysis Using Microsoft Excel
This book includes step-by-step examples and case studies that teach users the many power tricks for analyzing data in Excel. These are tips honed by Bill Jelen, “MrExcel,” during his 10-year run as a financial analyst charged with taking mainframe data and turning it into useful information quickly. Topics include perfectly sorting...
Reconfigurable Computing: Architecture, Tools, and Applications: 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, Proceedings
Reconfigurable Computing: Architecture, Tools, and Applications: 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008, Proceedings
This book constitutes the refereed proceedings of the 4th International Workshop on Applied Reconfigurable Computing, ARC 2008, held in London, UK, in March 2008.

The 21 full papers and 14 short papers presented together with the abstracts of 3 keynote lectures were carefully reviewed and selected from 56 submissions. The papers are organized...

Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology examines cost-saving trends in architecture planning, administration, and management....
BlackBerry For Dummies (Computer/Tech)
BlackBerry For Dummies (Computer/Tech)

Maximize your BlackBerry 8800, Curve, or Pearl!

Explore the camera and GPS, discover SureType, and boost your memory

If you thought the BlackBerry was sweet before, just wait until you see the new models! And here's just what you need to know about SureType vs. QWERTY keyboards,...

High Performance Embedded Computing Handbook: A Systems Perspective
High Performance Embedded Computing Handbook: A Systems Perspective
Embedded systems technology involves a range of topics, including analog-to-digital conversion and application-specific integrated circuit design. From the history of high-performance computing to a discussion of future directions, High Performance Embedded Computing Handbook offers comprehensive coverage of all aspects of these...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy