Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
System Analysis, Design, and Development : Concepts, Principles, and Practices
System Analysis, Design, and Development : Concepts, Principles, and Practices
Learn to develop systems that meet customer needs and organizational objectives

Successful system development requires formulation and implementation of a sound technical strategy that accurately translates the user's operational needs into a physical solution to comply with their specifications and contract requirements. System Analysis,...

Mastering Maya 7
Mastering Maya 7
This official, Alias-endorsed guide offers comprehensive, in-depth coverage of the Maya interface. You'll find:

  • A Quick Start overview followed by in-depth coverage of the Maya interface and all of the tools for modeling, texturing, animation, and special effects.
  • Information on of all of Maya's latest...
Pro SQL Server Disaster Recovery
Pro SQL Server Disaster Recovery
Many would argue that the single, most important job of a SQL Server database administrator is to be able to recover your database in the event of loss or damage. Pro SQL Server Disaster Recovery helps you meet that goal by showing you how to think about and plan for potential problems. You’ll learn to anticipate and reduce the...
MPLS: Next Steps, Volume 1 (The Morgan Kaufmann Series in Networking)
MPLS: Next Steps, Volume 1 (The Morgan Kaufmann Series in Networking)
Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has...
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
User-Centered Design Stories: Real-World UCD Case Studies (Interactive Technologies)
User-Centered Design Stories: Real-World UCD Case Studies (Interactive Technologies)

Intended for both the student and the practitioner, this is the first user-centered design casebook. It follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation. In this book, the reader is asked to perform analysis of dozens of UCD work situations and propose...

The Thermodynamics of Phase and Reaction Equilibria
The Thermodynamics of Phase and Reaction Equilibria

This book provides a sound foundation for understanding abstract concepts of phase and reaction equilibria (e.g. partial molar Gibbs energy, fugacity, and activity), and shows how to apply these concepts to solve practical problems using numerous clear examples. It also presents numerical methods necessary for solving real-world problems as...

Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!

Building an analysis ecosystem for a smarter approach tointelligence

Keith Carter's Actionable Intelligence: A Guide to DeliveringBusiness Results with Big Data Fast! is the comprehensive guideto achieving the dream that business intelligence practitionershave been chasing since the concept itself came into being....

Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools

Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance...

The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)
The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)

The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving "Agility" in your business. Transcending beyond Agile as a software development method, it covers the gamut of methods in an organization?including...

The Brand Strategy Canvas: A One-Page Guide for Startups
The Brand Strategy Canvas: A One-Page Guide for Startups

Launching a startup is now easier than ever before. Building a lasting brand, however, remains a mystery for even the savviest of founders. An impactful, recognizable brand is perhaps a company’s most valuable intellectual property. And any strong brand starts with a strategy.

The Brand Strategy Canvas has...

Strategic Knowledge Management Technology
Strategic Knowledge Management Technology
Strategic Knowledge Management Technology is based on the premise that it is difficult, if not impossible, to manage a modern business or public organization without at least some understanding of the planning, use, control and benefits of information technology to support knowledge work in the organization. This book applies the knowledge-based...
unlimited object storage image
Result Page: 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy