Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Process Improvement with CMMI® v1.2 and ISO Standards
Process Improvement with CMMI® v1.2 and ISO Standards
In this age of globalization, process improvement practitioners must be able to comprehend and work with the different standards and frameworks used around the world. While many systems and software engineering organizations rely on a single standard as the primary driver of process improvement efforts (CMMI®-based process improvement in the...
Debating the Reagan Presidency (Debating Twentieth-Century America)
Debating the Reagan Presidency (Debating Twentieth-Century America)

The presidency of Ronald Reagan has become a Rorschach Test for politicians and citizens alike. Conservatives see the Reagan era as the high-water mark for their movement, in much the same way that many progressives view FDR's presidency as the pinnacle of liberalism. Liberals maintain that the rosy Reagan legacy is based largely on myth, and...

Beginning Xcode (Programmer to Programmer)
Beginning Xcode (Programmer to Programmer)
Bringing together the ease of use of Mac OS X, the power of Unix, and a mix of high-performance development technologies, Xcode is Apple's hottest new integrated development environment. This book shows you why Xcode is the fastest and easiest way for developers to create Mac OS X applications.

Covering the basic fundamentals...

OpenGL Graphics Through Applications
OpenGL Graphics Through Applications
This book is the result of teaching computer graphics for one and two semester, year two/three undergraduate and postgraduate lecture courses in Computer Graphics. Throughout the book, theory is followed by implementation using C/C++ and complete programs are provided with suggestions for change to enhance student understanding. During 30 years of...
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
The passage of the Sarbanes-Oxley Act (SOx) in 2002 almost seems like distant history today. That legislation became effective after a series of accounting scandals led to the failure of several then major corporations, such as Enron and WorldCom, the conviction and imprisonment of multiple key executives, and the failure of the major public...
Personal Computing Demystified
Personal Computing Demystified
Welcome to the personal computing adventure—and it is an adventure. You might be surprised to learn that few people, even the word wizards who write dictionaries and encyclopedias, attempt to define personal computing. It’s one of the phrases we just accept, thinking it has something to do with personal computers (PCs).And, it does....
Robust Control Systems with Genetic Algorithms (Control Series)
Robust Control Systems with Genetic Algorithms (Control Series)

In recent years, new paradigms have emerged to replace-or augment-the traditional, mathematically based approaches to optimization. The most powerful of these are genetic algorithms (GA), inspired by natural selection, and genetic programming, an extension of GAs based on the optimization of symbolic codes.

Robust
...

Mike Meyers' CompTIA Security+ Certification Passport, Fifth Edition  (Exam SY0-501) (Mike Meyers' Certification Passport)
Mike Meyers' CompTIA Security+ Certification Passport, Fifth Edition (Exam SY0-501) (Mike Meyers' Certification Passport)

This quick review, cram-style study guide offers 100% coverage of every topic on the latest version of the CompTIA Security+ exam

200 PRACTICE QUESTIONS FROM THE #1 NAME IN PROFESSIONAL CERTIFICATION!

This powerful exam preparation resource presents an accelerated review of the pertinent technology and...

Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)

The first edition of this book, which was published in 1995, contained thirteen chapters. My objective was to produce a general textbook that treated all the essential core areas of cryptography, as well as a selection of more advanced topics. In writing the book, I tried to design it to be flexible enough to permit a wide variety of...

Video Data Management and Information Retrieval
Video Data Management and Information Retrieval
Video data management and information retrieval are very important areas of
research in computer technology. Plenty of research is being done in these fields at
present. These two areas are changing our lifestyles because together they cover
creation, maintenance, accessing, and retrieval of video, audio, speech, and text data...
Mac OS X and iOS Internals: To the Apple's Core (Wrox Programmer to Programmer)
Mac OS X and iOS Internals: To the Apple's Core (Wrox Programmer to Programmer)
EVEN MORE THAN TEN YEARS AFTER ITS INCEPTION, there is a dearth of books discussing the architecture of OS X, and virtually none about iOS. While there is plentiful documentation on Objective-C, the frameworks, and Cocoa APIs of OS X, it often stops short of the system-call level and implementation specifi cs. There is some...
Corporate Plasticity: How to Change, Adapt, and Excel
Corporate Plasticity: How to Change, Adapt, and Excel

What do The Beatles, Apollo 13, the Roman military, a pack of wolves, and the very best companies in the world all have in common? Answer: Plasticity. They can change, adapt, and excel as the situation requires.

In most organizations, strategy and functional excellence get the most attention. But even the best of...

unlimited object storage image
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy