|
|
|
|
Microsoft FrontPage Version 2002 Inside OutThe World Wide Web has become the predominant electronic publishing medium on the planet. Once considered an obscure technical resource, the Internet now receives prominent publicity at sporting events, in presidential debates, in television commercials, and in print advertising and marketing materials everywhere. Without the... | | Handbook of Constraint Programming (Foundations of Artificial Intelligence)This encyclopedic work covers twenty-plus years of research in constraint programming in a readable, accessible and appealing way. For someone outside the field wondering what Constraint Programming is all about, this is the perfect introduction, and the book will remain useful as a reference for years. Michael Trick, Professor of Operations... | | LINQ in ActionLINQ, Language INtegrated Query, is a new extension to the Visual Basic and C# programming languages designed to simplify data queries and database interaction. It addreses O/R mapping issues by making query operations like SQL statements part of the programming language. It also offers built-in support for querying in-memory collections like... |
|
E-Commerce and V-BusinessE-commerce and V-business examines the impact of the Internet and associated technologies on two related aspects of business: electronic commerce and virtual organization. Using a combination of recent theory and empirical evidence it demonstrates how forward thinking organizations are reaping considerable advantages from exciting new business... | | RFID for the Optimization of Business ProcessesProf. Elgar Fleisch, ETH Zürich and University of St. Gallen:
"A comprehensive, clear and practical introduction for RFID designers."
Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:
"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying... | | Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... |
|
|
|
|
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 |