Home | Amazing | Today | Tags | Publishers | Years | Search 
Project Management for Information Systems (5th Edition)
Project Management for Information Systems (5th Edition)

We are very pleased to present this fifth edition of Project Management for Information Systems. As with its predecessors, our ‘target audience’ fall into four groups:

  • IS project managers and systems developers who find themselves responsible for managing systems projects. Newcomers to this activity will find...
Managing the Dynamics of New Product Development Processes: A New Product Lifecycle Management Paradigm
Managing the Dynamics of New Product Development Processes: A New Product Lifecycle Management Paradigm

In contemporary globally competitive markets, the development of new products is considered a critical success factor for organizations. Significant efforts have been invested in the development of methods and tools for improving the management of design processes, being a key element in development processes, especially those related...

Cloud Computing: Web-Based Dynamic IT Services
Cloud Computing: Web-Based Dynamic IT Services

Cloud computing is on everyone’s lips: as an innovative technology, as the next generation of the Internet, as a fundamental transformation of the entire IT landscape, and as an auspicious opportunity to introduce new business ideas. But what is actually at the heart of this notion?

As a result of the multi-faceted...

Mastering SQL Queries for SAP Business One
Mastering SQL Queries for SAP Business One

This book has been created to serve the needs of many SAP Business One users. If you have a chance to browse the SAP business One website between mid-2008 and mid-2011, you will find that my name is always on the top contributor's list. I have solved many SQL Query related problems faced by many users, and some such users have asked me...

Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)

Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...

CMOS Integrated Switching Power Converters: A Structured Design Approach
CMOS Integrated Switching Power Converters: A Structured Design Approach

The application framework of the presented research work is stablished in the area of the low-power portable stand-alone devices. Considering as a paradigm application the implementation of future portable terminals for telecommunications, two opposed trends coexist that determine the need for an optimized energy management. An...

Mathematics for Multimedia
Mathematics for Multimedia

Beautiful mathematical ideas abound in multimedia software! Some are not encountered until late in undergraduate or even postgraduate study, whereas they can be appreciated and used much earlier. This book presents a few dozen such pearls, strung together by their ubiquity in many applications. It is based on the course Topics in...

Computer Algorithms
Computer Algorithms

If wo try to identify those contributions of computer science which will be long lasting, surely one of these will be the refinement of the concept called algorithm. Ever since man invented the idea of a machine which could per form basic mathematical operations, the study of what can be computed and how it can be done well was...

Machine Learning in Action
Machine Learning in Action

After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
iPod: The Missing Manual
iPod: The Missing Manual
What a difference a decade makes. When Apple introduced the very first iPod back in October 2001, it was a bulky chunk of white plastic, chrome, and glass that held a mere 5 gigabytes of music. But its concept was simple and enticing: you could carry 1,000 songs around in your pocket. And people did.
 
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
In earlier definitions, organization’s competency is mainly addressing its capabilities, for example Gallon (Gallon et al, 1995) defines competency as “aggregation of capabilities, where synergy that is created has sustainable value and broad applicability”. However participation of VBE members in general VBE...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy