Home | Amazing | Today | Tags | Publishers | Years | Search 
IBM Lotus Notes and Domino 8.5.1
IBM Lotus Notes and Domino 8.5.1

With Lotus Notes and Domino 8.5.1, IBM has once again provided business users with an intuitive, fully integrated platform to enhance each user's experience with business communications, while reducing Total Cost of Ownership (TCO) and increasing Return on Investment (ROI). You can create and share information effectively to make quick business...

Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States

Relations between the European Union and China have grown at a sustained pace across the board in recent times, transforming the relationship from one of previous neglect into a matter of global strategic significance. This book offers an examination of the evolution of contemporary EU-China relations in the economic, technological and high...

Successful Software Development (2nd Edition)
Successful Software Development (2nd Edition)

For courses in Software Engineering and Software Reliability. Successful Software Development takes a systematic approach to consistently successful software development. It proceeds from the fact that there is no one way to develop software systems and introduces a model for a mature software development process that accommodates flexibility,...

Economic Models and Algorithms for Distributed Systems (Autonomic Systems)
Economic Models and Algorithms for Distributed Systems (Autonomic Systems)

Distributed computing paradigms for sharing resources such as Clouds, Grids, Peer-to-Peer systems, or voluntary computing are becoming increasingly popular. While there are some success stories such as PlanetLab, OneLab, BOINC, BitTorrent, and SETI@home, a widespread use of these technologies for business applications has not yet been...

As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)
As If an Enemy's Country: The British Occupation of Boston and the Origins of Revolution (Pivotal Moments in American History)

In the dramatic few years when colonial Americans were galvanized to resist British rule, perhaps nothing did more to foment anti-British sentiment than the armed occupation of Boston. As If an Enemy's Country is Richard Archer's gripping narrative of those critical months between October 1, 1768 and the winter of 1770 when Boston was...

The English Parliaments of Henry VII 1485-1504 (Oxford Historical Monographs)
The English Parliaments of Henry VII 1485-1504 (Oxford Historical Monographs)

Paul Cavill offers a major reinterpretation of early Tudor constitutional history. In the grand "Whig" tradition, the parliaments of Henry VII were a disappointing retreat from the onward march towards parliamentary democracy. The king was at best indifferent and at worst hostile to parliament; its meetings were cowed and quiescent,...

Implementing Quality in Laboratory Policies and Processes: Using Templates, Project Management, and Six Sigma
Implementing Quality in Laboratory Policies and Processes: Using Templates, Project Management, and Six Sigma

The credibility of a laboratory’s reputation is directly affected by its quality assurance program. The key to a successful quality assurance program is the manuals, and associated documents define the program and its various components. Therefore, by extension, a laboratory’s credibility is directly related to its operational and...

Mac Security Bible
Mac Security Bible

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into...

Hacking For Dummies
Hacking For Dummies

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that...

Agricultural Biotechnology in International Development (Biotechnology in Agriculture Series)
Agricultural Biotechnology in International Development (Biotechnology in Agriculture Series)

Obtaining world food security and food self-reliance for the developing nations is a complex and difficult task, but with increased research and education, agricultural production in developing countries can be improved. Biotechnology applications, integrated into traditional systems, hold much promise in this respect. Realizing the positive...

Mobile Application Security
Mobile Application Security

Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest...

Handbook on the Northeast and Southeast Asian Economies (Elgar Original Reference)
Handbook on the Northeast and Southeast Asian Economies (Elgar Original Reference)

Undoubtedly, the rapid transformation of a band of four Northeast Asian economies (South Korea, Taiwan, Singapore and Hong Kong) since the mid-1960s has been unprecedented in economic history. Their experience has surpassed the earlier experience of Japan’s transformation into an industrial economy, and that of the former USSR. Although...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy