Home | Amazing | Today | Tags | Publishers | Years | Search 
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Information technology has now pervaded the legal sector, and the very modern concepts of e-law and e-justice show that automation processes are ubiquitous. European policies on transparency and information society, in particular, require the use of technology and its steady improvement.

Some of the revised papers presented in this book...

Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Electronic Theses and Dissertations: A Sourcebook for Educators: Students, and Librarians (Books in Library and Information Science)
Electronic Theses and Dissertations: A Sourcebook for Educators: Students, and Librarians (Books in Library and Information Science)
Electronic Theses and Dissertations examines how electronic publication of theses and dissertations might enhance graduate education. This text clarifies the composition, evaluation, dissemination, and preservation of electronic theses and dissertations (ETDs), and provides a conceptual framework for the development of effective ETD programs. It...
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise
Service-Oriented Architecture (SOA) Governance for the Services Driven Enterprise

A must-have for all companies undertakingservice-oriented architecture (SOA) governance

As SOA interest and adoption have accelerated rapidly, the challenges of governance have risen to the forefront across the entire industry. Without an SOA governance model, SOA adoption is stilted and hampered by a lack of...

Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
Active Directory For Dummies (Computer/Tech)
Active Directory For Dummies (Computer/Tech)

Fully updated with all the exciting AD enhancements!

Design and deploy Active Directory to simplify policy and security management

This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this...

The Handbook of Project Management: A Practical Guide to Effective Policies and Procedures
The Handbook of Project Management: A Practical Guide to Effective Policies and Procedures
"A practical, comprehensive guide to be used frequently." Euronet "Written specifically to help project managers improve their performance using tried and tested techniques." Computer Consultant "Includes new material on the relationship between projects and programmes, and solving common problems."...
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
Understanding Criminology: Current Theoretical Debates (Crime and Justice)
"Provides a very clear, easily readable introduction to the wide range of criminological theories.". Anne Rees, University of Portsmouth, UK
  • What does contemporary criminological theory look like? .
  • What impact, if any, does it have on policy?
The new edition of this
...
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms
Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and...
Deploying and Administering Windows Vista Bible
Deploying and Administering Windows Vista Bible
Although analysts expect the majority of enterprises to tread slowly into migration, there certainly will be early adopters, as there are with any system or device. Because Microsoft has announced that it will support Windows 2000 only until the year 2010, enterprises using older versions of Windows will not have much time for leisurely testing and...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
A Standard for Enterprise Project Management (Esi International Project Management)
A Standard for Enterprise Project Management (Esi International Project Management)
Providing structured yet adaptable models of project success within an organization, A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It also supplies an inventory of practical policies, procedures, techniques, and...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy