The liberalization of the telecommunications markets in Sub-Saharan Africa led to increased competition on the provision and pricing of communication services. But, due to the lack of appropriate regulatory tools, newly established regulators are poorly equipped to arbitrate increasing interconnection disputes between competing operators.
This book is designed not to provide detailed audit/review programs for ERP systems but to underline the main concepts involved in each major phase of the ERP life cycle, as well as the major components of ERP systems of special interest to auditors. It is intended to familiarize the reader with the built-in controls in the ERP architecture...
Learn how you can use the revolutionary five-step marketing process that helped Microsoft, NBC Universal, and IBM achieve double-digit increases in sales.
"When HP uses the Voice of the Customer methodology, our marketing campaign results improve dramatically: response rates improve 3X to 10x, sales...
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...
Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration.
Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer....
This book presents the methodology and mathematical models for dual-fuel coal-gas power plants in two basic configurations: systems coupled in parallel and in series.
Dual-fuel gas and steam systems, especially parallel systems, have great potential for modernizing existing combined heat and power (CHP) plants. This book...
The Unix operating system is the basis for some of today's most-used platforms, including Mac OS® X and Linux®. This book covers Unix basics for these as well as the more commonly recognized Sun Solaris and BSD.
First, you will learn Unix terminology, core concepts, methodology, and how to log in...
A must-read in formal and semi-formal verification!
This book will explain how to verify SoC logic designs using formal and semi-formal verification techniques. The critical issue to be addressed is whether the functionality of the design is the one that the designers intended. Simulation has been used for checking the...
Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and...
The first book to explain the principals behind mobile 3D hardware implementation, helping readers understand advanced algorithms, produce low-cost, low-power SoCs, or become familiar with embedded systems
As mobile broadcasting and entertainment applications evolve, there is increasing interest in 3D graphics within the...
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...
Readers may never think of learning, training, or teaching the same way again! Building on the pioneering fundamentals of effective adult learning and many of the core principles of today's popular action learning methodology, Action Reflection Learning delivers a next-generation approach that will transform the way adult learning takes...