Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conceptual Modelling in Information Systems Engineering
Conceptual Modelling in Information Systems Engineering
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.

Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne...

Streetsmart Guide to Valuing a Stock
Streetsmart Guide to Valuing a Stock
Value and trust are two of the biggest question marks in today's tumultuous stock markets. Value because investors burned by the recent tech collapse are once again insisting that stocks provide some meat along with the sizzle, and trust because--for obvious reasons--investors...
Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings
Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings
This textbook is intended for use by SPI (Software Process Improvement) managers and researchers, quality managers, and experienced project and research managers. The papers constitute the research proceedings of the 15th EuroSPI (European Software Process Improvement, www.eurospi.net) conference in Dublin, Ireland, 3–5 September 2008....
Biocommunication and Natural Genome Editing
Biocommunication and Natural Genome Editing

This is the first uniform description of all key levels of communication in the organismic kingdoms of plants, fungi, animals and bacteria based on the most recent empirical data. Biocommunication occurs on three levels (A) intraorganismic, i.e. intra- and intercellular, (B) interorganismic, between the same or related species and (C)...

CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Shark Hunting in Paradise Garden
Shark Hunting in Paradise Garden

Flying sharks and robots...More fun than the Bible!

What would you expect to find if you traveled back in time to the Garden of Eden? Adam and Eve? The tree of knowledge? A wicked serpent? How about some giant fucking flying sharks! That's right, I said sharks. Biblical sharks. Sharks that are bigger than city buses....

Handbook on Business Information Systems
Handbook on Business Information Systems

This handbook covers the vast field of business information systems, focusing particularly on developing information systems to capture and integrate information technology together with the people and their businesses.

Part I of the book, Health Care Information Systems , focuses on providing global leadership for the optimal use...

The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

A Probability Path (Modern Birkhäuser Classics)
A Probability Path (Modern Birkhäuser Classics)

Many probability books are written by mathematicians and have the built-in bias that the reader is assumed to be a mathematician coming to the material for its beauty. This textbook is geared towards beginning graduate students from a variety of disciplines whose primary focus is not necessarily mathematics for its own sake. Instead,...

Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
unlimited object storage image
Result Page: 569 568 567 566 565 564 563 562 561 560 559 558 557 556 555 554 553 552 551 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy