Home | Amazing | Today | Tags | Publishers | Years | Search 
Structures of Participation in Digital Culture
Structures of Participation in Digital Culture
Digital technologies have been engines of cultural innovation, from the virtualization of group networks and social identities to the digital convergence of textural and audio-visual media. User-centered content production, from Wikipedia to YouTube to Open Source, has become the emblem of this transformation, but the changes run deeper and wider...
Software for Data Analysis: Programming with R (Statistics and Computing)
Software for Data Analysis: Programming with R (Statistics and Computing)
This is a book about Software for Data Analysis: using computer software to extract information from some source of data by organizing, visualizing, modeling, or performing any other relevant computation on the data. We all seem to be swimming in oceans of data in the modern world, and tasks ranging from scientific research to managing a business...
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Every year, organizations rely on Internet applications and services more deeply–and every year, Internet infrastructure grows more powerful and complex. As the limitations of traditional IPv4 addressing become increasingly apparent, many decision makers recognize that a transition to IPv6 is needed far sooner than anticipated. Global...
Six Sigma Tool Navigator: The Master Guide for Teams
Six Sigma Tool Navigator: The Master Guide for Teams
Six Sigma Tool Navigator is the only lean resource that provides a complete compendium of tools for teams engaged in Six Sigma improvement activities. In addition, it offers actual tools, definitions, and techniques you need to move your organization closer to producing minimal defects. Six Sigma Tool Navigator...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies (Artech House Mobile Communications Library)
Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies (Artech House Mobile Communications Library)
With the fast pace of change in today’s business environment, the need to transform organizations into agile enterprises that can respond quickly to change has never been greater. Methods and computer technologies are needed to enable rapid business and system change, and this practical book shows professionals how to achieve this agility....
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more...
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)
Developing IP-Based Services: Solutions for Service Providers and Vendors (The Morgan Kaufmann Series in Networking)

Offering new services is a great way for your organization to drive traffic and boost revenue, and what better foundation for these services than IP? This much is a given. The difficulty is uniting business and technical perspectives in a cohesive development and deployment process.

Meeting this challenge is the focus of...

Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
With the introduction of new revisions to Microsoft products—for example, Windows, Exchange, and Communications Server—we have seen a trend toward “roles” within each product, as opposed to the various products being an all-in-one type of solution (as with Exchange 2007), or being additional features that work as a snap-in,...
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
Comprehensive Functional Verification: The Complete Industry Cycle (Systems on Silicon)
As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Information Technology and Organizational Transformation: Solving the Management Puzzle
Information Technology and Organizational Transformation: Solving the Management Puzzle
This text is designed to help managers who have to deal with a complex environment, and who are often presented with "ready-made" solutions as to how to best organize their firm, to best use information technology.

Information Technology and Organizational Transformation presents a simple and attractive
...
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy