|
|
|
|
|
Use Cases Patterns and BlueprintsThis book brings together dozens of proven patterns for creating use cases that more accurately reflect real requirements, are easier to translate into working systems, and are simpler to maintain. Utilizing these patterns, architects, analysts, engineers, and managers can leverage decades of hard-earned knowledge to achieve... | | Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... | | Advanced Maya Texturing and LightingIf you already understand the basics of Maya, the industry-leading 3D animation and effects software, you’ll be ready to move on to the sophisticated topics in this updated edition of Advanced Maya Texturing and Lighting. Detailed, easy-to-follow instructions will teach you the real-world production secrets that professional... |
|
Linear Integral Equations (Applied Mathematical Sciences)
This book combines theory, applications, and numerical methods, and covers each of these fields with the same weight. In order to make the book accessible to mathematicians, physicists, and engineers alike, the author has made it as self-contained as possible, requiring only a solid foundation in differential and integral calculus. The... | | UML for Database DesignThe Unified Modeling Language (UML), the standard graphical notation for modeling business and software application needs, has emerged as an effective modeling tool for database design. When used as a common modeling language for the many facets of system development, the UML can serve as a unifying framework that facilitates... | | Inside Cyber Warfare: Mapping the Cyber Underworld
During his campaign for reelection in 1996, the Internet-savvy President Bill Clinton used the slogan “Building a Bridge to the 21st Century.” It turns out that the bridge is operated and maintained in cyber form, and that malevolent actors can practice their black arts to disrupt or destroy the bridge, its cyber traffic, and all... |
|
Knowledge Mapping and Management
Knowledge Management is fast becoming a hot topic of discussion and
research. The capture, use, production and storage of knowledge is an issue of
paramount importance for businesses, universities, public and private organizations.
Because this is such an important topic, it is essential for researchers, academicians
and managers to... | | Beginning Direct3D Game Programming, Second Edition
With a detailed explanation of vertex and pixel shader programming, coverage of the new Microsoft HLSL (High-Level Shader Language), and greater concentration of the fixed-function pipeline, the second edition of this popular reference guide will take you farther than you ever imagined! Written by an industry expert, this book will put an end... | | Ethics for CPAs: Meeting Expectations in Challenging TimesAccountants are under attack. Recent investigations of Enron, Global Crossing, WorldCom, and Adelphia, just to name a few, along with the remarkable collapse of Arthur Andersen, have focused the nation’s attention on the accounting profession and the need for reforms. All parties agree that accounting firms must change their priorities and... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |