Home | Amazing | Today | Tags | Publishers | Years | Search 
The Entrepreneur's Guide to Managing Information Technology
The Entrepreneur's Guide to Managing Information Technology
Software. Hardware. Networks. Wireless. Entrepreneurs face a bewildering array of choices and decisions when it comes to incorporating technology into the fabric of their businesses. Yet nothing could be more important these days. Aligning information technology (IT) with business strategy is essential to meet and beat the competition. As business...
Python: Create - Modify - Reuse
Python: Create - Modify - Reuse

Python: Create-Modify-Reuse

Aimed at all levels of Python developers who are interested in a task-based way of learning Python development, this hands-on book shows how you can efficiently use Python to create robust, real-world applications. After a brief primer on this object-oriented, interactive programming...

Information Security Management Handbook, Fourth Edition, Volume III
Information Security Management Handbook, Fourth Edition, Volume III
A wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent.
- Technical Support, Dec. 2004

This is a must-have book for those preparing for the CISSP exam and for any information security professional.
- Zentralblatt MATH 1054, May 2005
...
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering
Innovations and Advanced Techniques in Computer and Information Sciences and Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Computer Engineering and Information Sciences.

Innovations and Advanced Techniques in...

Adoption-centric Usability Engineering: Systematic Deployment, Assessment and Improvement of Usability Methods in Software Engineering
Adoption-centric Usability Engineering: Systematic Deployment, Assessment and Improvement of Usability Methods in Software Engineering
Where should usability techniques and HCD knowledge be considered in the existing software development lifecycle to maximize benefits gained from SE and HCD approaches? This book provides an integrative answer while proposing a systematic approach for the adoption, assessment and deployment of usability engineering methods within software...
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS: Practical Implementation Guide and Workbook
Wiley IFRS Practical Implementation Guide and Workbook Second Edition

A one-stop resource for understanding and applying current International Financial Reporting Standards

The year 2007 proved to be yet another historic year of watershed events for the International Financial Reporting Standards (IFRS) firstly, due to the...

Best Practices in Business Technology Management
Best Practices in Business Technology Management
A Tour de Force of Business Technology Management

Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Introducing Maya 6: 3D for Beginners
Introducing Maya 6: 3D for Beginners

"If you're just beginning to dive into the world of 3D, this is the book for you."
--Animation Magazine

Alias' Academy Award winning Maya 3D animation and effects software leads the industry in technological innovation. Film and video artists, computer game developers,...

OFDM Towards Fixed and Mobile Broadband Wireless Access
OFDM Towards Fixed and Mobile Broadband Wireless Access
Presenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the...
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners...
Human computer Interaction And Management Information Systems: Foundations (Advances in Management Series)
Human computer Interaction And Management Information Systems: Foundations (Advances in Management Series)
"Human-Computer Interaction and Management Information Systems: Foundations" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students,...
Result Page: 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy