 |
|
|
|
|
 Encyclopedia of Prisoners of War and InternmentThis invaluable A-to-Z reference work presents nearly 300 entries that survey the history of prisoners of war and interned civilians from the earliest times to the present, with emphasis on the nineteenth and twentieth centuries. It explores such themes as famous prisoners of war throughout history, medical conditions, atrocities, escapes,... |  |  IP LocationIn today's vast world of global commerce with users that are more nomadic than ever, the need for reliable, secure, and efficient access technologies is rapidly increasing. IP Location provides you with a guided tour of location determination, tackling this new technology head on and addressing all aspects of location management,... |  |  Alfresco Enterprise Content Management ImplementationThis well-crafted and easy-to-use book is a complete guide to implementing enterprise content management in your business using Alfresco. It guides you through creating smart, collaborative content repositories, and shows how to use Alfresco to create more elegant document sharing, better collaborative working, and reliable automated workflow... |
|
|
 The Mythical Man-Month: Essays on Software Engineering, 20th Anniversary EditionThe classic book on the human elements of software engineering. Software tools and development environments may have changed in the 21 years since the first edition of this book, but the peculiarly nonlinear economies of scale in collaborative work and the nature of individuals and groups has not changed an epsilon. If you write code or... |  |  Microsoft Windows SharePoint Services Inside OutTake your Windows SharePoint Services experience to the next level! Designed for advanced users, this supremely organized reference packs all the information you need to master every major tool, task, and enhancement in Windows SharePoint Serviceswithout the fluff. Discover how to simplify information sharing, make team collaboration more... |  |  Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... |
|
|
Result Page: 96 95 94 93 92 91 90 89 88 87 |