Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JBoss Drools Business Rules
JBoss Drools Business Rules

In business, a lot of actions are trigged by rules: "Order more ice cream when the stock is below 100 units and temperature is above 25° C", "Approve credit card application when the credit background check is OK, past relationship with the customer is profitable, and identity is confirmed", and so on. Traditional...

ATM Technology for Broadband Telecommunications Networks
ATM Technology for Broadband Telecommunications Networks
This textbook presents all the latest information on all aspects of each important component of ATM - the hottest telecommunications technology of this decade. It demonstrates how ATM internetworks several incompatible telecommunications technologies and provide the high-speed, high bandwidth backbone network that the entire telecom industry is...
Privacy Protection for E-Services
Privacy Protection for E-Services
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material,...
Wings of Fire: An Autobiography of APJ Abdul Kalam
Wings of Fire: An Autobiography of APJ Abdul Kalam
Autobiography of an Indian scientist.

Bharat Ratna Dr. Avul Pakir Jainulabdeen Abdul Kalam born October 15, 1931, Tamil Nadu, India, usually referred to as Dr. A. P. J. Abdul Kalam^, was the eleventh President of India, serving from 2002 to 2007.[2] Due to his unconventional working style, he is also popularly known as the People's
...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Architecting Software Intensive Systems: A Practitioners Guide
Architecting Software Intensive Systems: A Practitioners Guide
Today our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct...
Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies For Small Businesses
Successful Proposal Strategies for Small Businesses: Using Knowledge
Management to Win Government, Private-Sector, and International
Contracts, Fourth Edition, is designed to provide entrepreneurs, as
well as beginner and experienced proposal managers, capture managers,
proposal writers, proposal specialists and coordinators,
...
Investing in Fixer-Uppers
Investing in Fixer-Uppers

How to get rich fast by making ugly houses beautiful!

Want to find great opportunities and make big bucks in the hottest business there is? Now you can take advantage the nation's huge and growing demand for quality housing and get rich doing it! Investing in Fixer-Uppers helps you develop the knowledge and...

Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
In 2005, the U.S. Government Accountability Office recommended that all agencies begin planning a coherent transition to IPv6. IPv6 will solve the problem of limited IP addresses and improve internetworking capabilities. This promising protocol is gaining momentum and it is only a matter of time before the transition will have to occur globally....
Services Marketing: Concepts, Strategies, & Cases
Services Marketing: Concepts, Strategies, & Cases

Hoffman and Bateson's SERVICES MARKETING: CONCEPTS, STRATEGIES, AND CASES examines the use of services marketing as a competitive tool from a uniquely broad perspective. The book explores services marketing not only as an essential focus for service firms, but also as a source of competitive advantage for companies that market tangible...

Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)
Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)

 This book seeks to contribute to prior research facing the discussion about public value creation in Smart Cities and the role of governments.  In the early 21st century, the rapid transition to a highly urbanized population has made societies and their governments around the world to be meeting unprecedented challenges...

unlimited object storage image
Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy