Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Model for Calculating Interconnection Costs in Telecommunications
A Model for Calculating Interconnection Costs in Telecommunications
The liberalization of the telecommunications markets in Sub-Saharan Africa led to increased competition on the provision and pricing of communication services. But, due to the lack of appropriate regulatory tools, newly established regulators are poorly equipped to arbitrate increasing interconnection disputes between competing operators.
...
Integrated Auditing of ERP Systems
Integrated Auditing of ERP Systems

This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...

Voice-of-the-Customer Marketing: A Revolutionary 5-Step Process to Create Customers Who Care, Spend, and Stay
Voice-of-the-Customer Marketing: A Revolutionary 5-Step Process to Create Customers Who Care, Spend, and Stay

Learn how you can use the revolutionary five-step marketing process that helped Microsoft, NBC Universal, and IBM achieve double-digit increases in sales.

"When HP uses the Voice of the Customer methodology, our marketing campaign results improve dramatically: response rates improve 3X to 10x, sales
...

The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Automating Linux and Unix System Administration, Second Edition (Expert's Voice in Linux)
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.

Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....

Dual-Fuel Gas-Steam Power Block Analysis: Methodology and Continuous-Time Mathematical Models (Power Systems)
Dual-Fuel Gas-Steam Power Block Analysis: Methodology and Continuous-Time Mathematical Models (Power Systems)

This book presents the methodology and mathematical models for dual-fuel coal-gas power plants in two basic configurations: systems coupled in parallel and in series.

Dual-fuel gas and steam systems, especially parallel systems, have great potential for modernizing existing combined heat and power (CHP) plants. This book...

Beginning Unix (Programmer to Programmer)
Beginning Unix (Programmer to Programmer)
The Unix operating system is the basis for some of today's most-used platforms, including Mac OS® X and Linux®. This book covers Unix basics for these as well as the more commonly recognized Sun Solaris and BSD.

First, you will learn Unix terminology, core concepts, methodology, and how to log in...

Verification Techniques for System-Level Design (Systems on Silicon)
Verification Techniques for System-Level Design (Systems on Silicon)
A must-read in formal and semi-formal verification!

This book will explain how to verify SoC logic designs using formal and semi-formal verification techniques. The critical issue to be addressed is whether the functionality of the design is the one that the designers intended. Simulation has been used for checking the
...
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)

Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and...

Mobile 3D Graphics SoC: From Algorithm to Chip
Mobile 3D Graphics SoC: From Algorithm to Chip

The first book to explain the principals behind mobile 3D hardware implementation, helping readers understand advanced algorithms, produce low-cost, low-power SoCs, or become familiar with embedded systems

As mobile broadcasting and entertainment applications evolve, there is increasing interest in 3D graphics within the...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Action Reflection Learning (TM): Solving Real Business Problems by Connecting Learning with Earning
Action Reflection Learning (TM): Solving Real Business Problems by Connecting Learning with Earning

Readers may never think of learning, training, or teaching the same way again! Building on the pioneering fundamentals of effective adult learning and many of the core principles of today's popular action learning methodology, Action Reflection Learning delivers a next-generation approach that will transform the way adult learning takes...

unlimited object storage image
Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy