Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Social and Cognitive Impacts of e-Commerce on Modern Organizations
The Social and Cognitive Impacts of e-Commerce on Modern Organizations

The Social and Cognitive Impacts of E-Commerce on Modern Organizations includes articles addressing the social, cultural, organizational, and cognitive impacts of e-commerce technologies and advances on organizations around the world. Looking specifically at the impacts of electronic commerce on consumer behavior, as well as the impact...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Surviving the War for Talent in Asia: How Innovation Can Help
Surviving the War for Talent in Asia: How Innovation Can Help

Find and Keep the Outstanding Leaders You Need to Win in Asia!

  • Specific solutions for recruiting and retaining great people in North Asia, South Asia, Australia, and New Zealand
  • Seven new case studies, plus...
Spatial AutoRegression (SAR) Model: Parameter Estimation Techniques (SpringerBriefs in Computer Science)
Spatial AutoRegression (SAR) Model: Parameter Estimation Techniques (SpringerBriefs in Computer Science)
Explosive growth in the size of spatial databases has highlighted the need for spatial data analysis and spatial data mining techniques to mine the interesting but implicit spatial patterns within these large databases. Extracting useful and interesting patterns from massive geo-spatial datasets is important for many application...
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
"The time has come for the consumers themselves to step forward and to specify a standard for meta data semantics and meta data exchange. This book is an important first step in that direction."
–W. H. Inmon, from the Foreword

The Common Warehouse Metamodel (CWM) is rapidly gaining momentum within the data warehousing...

IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Performance Tuning for Linux(R) Servers
Performance Tuning for Linux(R) Servers
Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise ServerAn indispensable guide to maximizing Linux system and application performanceFrom Wall...
Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Java(tm) for S/390® and AS/400® COBOL Programmers
Java(tm) for S/390® and AS/400® COBOL Programmers
Written by mainframe and midrange professionals George Farr and Phil Coulthard, Java for S/390 & AS/400 COBOL Programmers is designed to help COBOL programmers make the jump to Java. It teaches COBOL programmers how to read and write Java programs and helps them understand the concepts necessary to continue to improve their Java skills. Rather...
Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses
Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses

Innovate or die

For thirty years, Gary Shapiro has observed the world's most innovative businesses from his front-row seat as leader of the Consumer Electronics Association. Now he reveals the ten secrets of "ninja innovators" like Apple, Amazon, Google, Microsoft, and many others.

What does it take to...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy