 |
|
|
|
 |  |  |  |  Business Analysis and Design: Understanding Innovation in Organisation
A logo is usually some form of graphic—a visualisation used by organisations,
groups or even individuals to aid and promote instant recognition. When we use
logos within this book, they are designed to promote recognition of some of the
fundamentally different ways of thinking you will experience.
As a logo... |
|
 |  |  Cryptography and Public Key Infrastructure on the InternetCryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation, ... |  |  Agile Software Construction This book is about exploiting as many features of the agile movement as possible to enhance our software development processes. It is about selling you the concept o fagile software development. It is about how to make your projects agile. It is about what tools you should use to become agile.
This book is about not rejecting... |
|
 Technologies for the Wireless Future: Wireless World Research Forum (WWRF)As 3G mobile communication systems are being deployed, the research community is now focusing on the research needed for the long-term evolution of 3G and 4G systems. This fully updated second volume of the successful Technologies for the Wireless Future is a unique and timely book, presenting up-to-the-minute ideas and trends in mobile... |  |  The Linux Process ManagerThe book assumes that the reader has some previous knowledge of operating system structure and terminology. For anyone needing such a background I can recommend my book Operating Systems (O’Gorman, 2000), which is a short readable introduction to the topic. Operating Systems with Linux (O’Gorman, 2001) is much more... |  |  Multimedia Forensics and SecurityAs information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,... |
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 |