Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

PC Hacks : 100 Industrial-Strength Tips &Tools
PC Hacks : 100 Industrial-Strength Tips &Tools
Covering both Windows and Linux, PC Hacks combines the bestselling Hacks series style with the world's most popular computing hardware. Hacks for enhancing performance and preventing problems with your PC include overclocking CPU and video cards, tweaking RAM timing, selecting the best performing components,...
Enterprise Resource Planning: Global Opportunities and Challenges
Enterprise Resource Planning: Global Opportunities and Challenges
How can ERP be used to improve the overall organizational operating efficiency and effectiveness? How is ERP going to evolve in the future and what are the implications for Electronic commerce? The overall objective of Enterprise Resource Planning: Global Opportunities and Challenges is to provide students, academicians and practitioners interested...
Pro Windows Phone App Development (Professional Apress)
Pro Windows Phone App Development (Professional Apress)
Windows Phone, updated in Windows Phone 7.5, presents an exciting opportunity for developers to build and monetize mobile applications. It represents a major new investment into mobile computing by Microsoft, and in many ways is a major break from the past. To build applications for Windows Phone, it is important to understand its...
Using Game Theory to Improve Safety within Chemical Industrial Parks
Using Game Theory to Improve Safety within Chemical Industrial Parks

Though the game-theoretic approach has been vastly studied and utilized in relation to economics of industrial organizations, it has hardly been used to tackle safety management in multi-plant chemical industrial settings. Using Game Theory for Improving Safety within Chemical Industrial Parks presents an in-depth discussion of...

Magento Mobile How-To
Magento Mobile How-To

Create and configure your own Magento Mobile application and publish it for the Android and iOS platforms

Overview

  • Style and theme your Magento Mobile Application interface
  • Configure Product categories and add static content for mobile
  • Prepare and publish your Magento mobile...
Deploying Windows 2000 with Support Tools
Deploying Windows 2000 with Support Tools
Visually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier...
Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

SFML Game Development by Example
SFML Game Development by Example

Create and develop exciting games from start to finish using SFML

About This Book

  • Familiarize yourself with the SFML library and explore additional game development techniques
  • Craft, shape, and improve your games with SFML and common game design elements
  • A practical guide...
Value-Based Software Engineering
Value-Based Software Engineering

The IT community has always struggled with questions concerning the value of an organization’s investment in software and hardware. It is the goal of value-based software engineering (VBSE) to develop models and measures of value which are of use for managers, developers and users as they make tradeoff decisions between, for example,...

unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy