Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Requirements Engineering
Requirements Engineering
Written for those who want to develop their knowledge of requirements engineering process, whether practitioners or students. Using the latest research and driven by practical experience from industry, this book gives useful hints to practitioners on how to write and structure requirements. - Explains the importance of Systems Engineering and the...
Core Java Volume I--Fundamentals (9th Edition) (Core Series)
Core Java Volume I--Fundamentals (9th Edition) (Core Series)

Fully updated to reflect Java SE 7 language changes, Core Java™, Volume I—Fundamentals, Ninth Edition, is the definitive guide to the Java platform.

 

Designed for serious programmers, this reliable, unbiased,...

Database Modeling for Industrial Data Management: Emerging Technologies and Applications
Database Modeling for Industrial Data Management: Emerging Technologies and Applications
Collecting and presenting the latest research and development results from the leading researchers in the field of industrial database modeling, Database Modeling for Industrial Data Management: Emerging Technologies and Applications provides a single record of current research and practical applications in industrial database modeling. This book...
SAP Business ONE Implementation
SAP Business ONE Implementation
SAP Business ONE brings the power of the SAP ERP platform to small and mid-size companies. It offers fast-growing companies the same ERP capabilities used in world-wide conglomerates and major corporations. SAP Business ONE is powerful, and to fully harness it takes careful planning.

This book will provide you with a guide to install and...

Buy-In: Saving Your Good Idea from Getting Shot Down
Buy-In: Saving Your Good Idea from Getting Shot Down
You've got a good idea. You know it could make a crucial difference for you, your organization, your community. You present it to the group, but get confounding questions, inane comments, and verbal bullets in return. Before you know what's happened, your idea is dead, shot down. You're furious. Everyone has lost: Those who...
C# Precisely
C# Precisely
This book describes the programming language C# (pronounced “c sharp”), version 2.0. It is a quick reference for the reader who has already learnt or is learning C# from a standard textbook and who wants to know the language in more detail. It should be particularly useful for readers who know the Java programming language and who want...
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Essential Law for Marketers
Essential Law for Marketers

'Essential Law for Marketers' offers clear and concise explanations of the laws that impact on the practice of marketing, advertising, sponsorship, design and public relations, providing expert guidance on crucial issues for the busy practitioner.

Each chapter in the book offers, in simple English,
...

Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)
Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)

Haptics technology is being used more and more in different applications, such as in computer games for increased immersion, in surgical simulators to create a realistic environment for training of surgeons, in surgical robotics due to safety issues and in mobile phones to provide feedback from user action. The existence of these applications...

Linux Networking-Howto
Linux Networking-Howto
The Linux Networking-HOWTO details important networking issues when using the popular Linux operating system. Linux Networking-HOWTO includes:

* informative background material for newcomers
* a generic discussion of networking issues
* technology-specific information grouped in three main sections: Ethernet and IP-related
...

Windows 2000 Commands Pocket Reference
Windows 2000 Commands Pocket Reference
This desktop reference documents Windows 2000 command mode. It is designed for system administrators, but will also prove beneficial to many other types of users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit (space permitting). Resource Kit commands...
ITIL Service Transition 2011 Edition (Best Management Practices)
ITIL Service Transition 2011 Edition (Best Management Practices)

The ITIL Editions 2011 has been updated for clarity, consistency, correctness and completeness. By focusing on delivery and control process activities, ITIL Service Operation describes how a highly desirable steady state of managing services can be achieved on a day-to-day basis. Key Features The updated ITIL publications share a similar...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy