 |
|
 The Economics of Contracts: Theories and ApplicationsA comprehensive and up-to-date synthesis of the economic analysis of contracts written by a specially commissioned team of leading international scholars. The book offers a well structured analysis of theoretical developments, the diverse fields of applications, the methodologies in use, and the policy implications at both firm and state level. The... |  |  Philosophical Frameworks for Understanding Information SystemsInformation systems have five main areas of research and practice in which humans relate to information and communications technology. Typically isolated from one another, these areas are: the nature of computers and information, the creation of information technologies, the development of artifacts for human use, the usage of information systems,... |  |  Introducing Maya 6: 3D for Beginners"If you're just beginning to dive into the world of 3D, this is the book for you." --Animation Magazine
Alias' Academy Award winning Maya 3D animation and effects software leads the industry in technological innovation. Film and video artists, computer game developers,... |
|
 Forensic Computer Crime InvestigationThe Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest... |  |  The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP LawThe content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.
This book is designed to empower you to:
* Understand... |  |  Internet Marketing: Strategy, Implementation and Practice (3rd Edition)This book is a comprehensive guide to how organizations can use the internet to support their marketing activities and covers all aspects of Internet marketing - environment analysis, strategy development and implementation. Building on the successful and widely regarded first edition, this second edition has a completely revised structure and... |
|
 Security and Software for Cybercafes (Premier Reference Source)Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information,... |  |  |  |  Handbook of Software Quality AssuranceThe industry's top guide to software quality -- completely updated!
Practical techniques for mission-critical and commercial software.
Build a great software quality organization.
Prepare for ASQ Software Quality Engineer Certification.
Software quality assurance has never been more challenging -- nor more... |
|
 XML in Flash (Sams Other)XML in Flash is an excellent introduction to creating state-of-the-art Flash applications with XML. XML is quickly becoming the most popular way to store and manage data. Flash's XML Socket makes it possible to network Flash front-ends to an application server. This allows developers to use a Flash interface for applications such as message boards,... |  |  Sams Teach Yourself Visual Basic .NET in 24 HoursTeach Yourself Visual Basic.NET in 24 Hours provides readers with 24 structured lessons with step-by-step guidance to real-world tasks. Each chapter also contains exercises that reinforce the lessons learned in each chapter. Tips, Notes, and Cautions provide additional advice from the authors on how to get up-to-speed and programming... |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |
|
| Result Page: 223 222 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 |