Home | Amazing | Today | Tags | Publishers | Years | Search 
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset
Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset

Organizations of all types struggle with information. Millions of dollars are spent on ERP applications to integrate data and yet this data still isn't accessible or relevant. Emails contain hidden liabilities. Safety manuals endanger workers. Worse, there is data and information being created and handled in every nook and cranny of large...

Web Service Contract Design and Versioning for SOA
Web Service Contract Design and Versioning for SOA

The Ultimate Guide for Designing and Governing Web Service Contracts

 

For Web services to succeed as part of SOA, they require balanced, effective technical contracts that enable services to be evolved and repeatedly reused for years to come....

Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition
Mike Meyers' CompTIA A Guide to Managing & Troubleshooting PCs Lab Manual, Third Edition

Practice the IT Skills Essential for Your Success

  • 115+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build...
Exercises in Synthetic Organic Chemistry
Exercises in Synthetic Organic Chemistry

This book is comprised of a series of exercises in synthetic organic chemistry based around recently published syntheses. Each exercise gives a reference to the original work, a synthetic scheme in which either structures or reagents have been omitted, a series of questions on the exercise, and in most cases references to related literature...

Chromatographic Detectors (Chromatographic Science Series)
Chromatographic Detectors (Chromatographic Science Series)

Written by a seasoned chromatographer with more that 40 years, experience in the field, this reference comprehensively covers the design, construction, and operation of gas chromatography (GC), liquid chromatography (LC), and thin-layer chromatography (TLC) detectors--all in one convenient, up-to-date source.

The development of...

Cyber Terrorism: A Guide for Facility Managers
Cyber Terrorism: A Guide for Facility Managers

In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and...

Standard for VHDL Register Transfer Level (Rtl) Synthesis
Standard for VHDL Register Transfer Level (Rtl) Synthesis

[This introduction is not part of IEEE Std 1076.6-1999, IEEE Standard for VHDL Register Transfer Level (RTL) Synthesis.]

This standard describes a syntax and semantics for VHDL RTL synthesis. It defines the subset of IEEE Std 1076-1993 (VHDL) that is suitable for RTL synthesis as well as the semantics of that subset for the...

Professional Flash Lite Mobile Development (Wrox Programmer to Programmer)
Professional Flash Lite Mobile Development (Wrox Programmer to Programmer)

Discover how to create Flash Lite mobile apps from the ground up

Adobe Flash is an ideal choice for developing rich interactive content for "Flash-enabled" mobile devices; and with this book, you'll learn how to create unique applications with Flash Lite. Through a series of code samples and extensive example...

C# 2010 All-in-One For Dummies
C# 2010 All-in-One For Dummies

A logical, straightforward approach to learning the C# language

C# is a complicated programming language for building .NET-connected software for Microsoft Windows, the Web, and a wide range of devices. The friendly All-in-One For Dummies format is a perfect way to present it. Each minibook is a self-contained package...

Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Result Page: 815 814 813 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy