Home | Amazing | Today | Tags | Publishers | Years | Search 
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
"Thought-provoking and far-sighted, this book provides a detailed analysis of the legal issues involved in on-line business and how a new generation of electronic agents can help. If you’re grappling with these issues today—or if you just want to see what’s coming tomorrow—this book is an excellent place to...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

Successful Evolution of Software Systems
Successful Evolution of Software Systems
In today’s fast-changing, competitive environment, having an up-to-date information system (IS) is critical for all companies and institutions. Rather than creating a new system from scratch, reengineering is an economical way to develop an IS to match changing business needs. Using detailed examples, this practical book gives you methods and...
Sams Teach Yourself More Visual Basic .NET in 21 Days
Sams Teach Yourself More Visual Basic .NET in 21 Days
Sams Teach Yourself More Visual Basic.NET in 21 Days provides step-by-step coverage of the most important new features of Visual Basic.NET and .NET that will allow programmers to begin creating rich Web applications and Web Services. Intermediate programmers gain the knowledge and skills to be able to design professional Windows applications and...
E-Commerce Usability: Tools and Techniques to Perfect the On-Line Experience
E-Commerce Usability: Tools and Techniques to Perfect the On-Line Experience
We are all familiar with airport bookstall best sellers that promise fame, fortune and success in relationships. Many of them – at least the ones I have skimmed whilst waiting for one of the world’s favourite airlines – are deeply disappointing. Not because they do not work (to be honest I have not really been able to try them out...
Functional Verification Coverage Measurement and Analysis (Information Technology: Transmission, Processing and Storage)
Functional Verification Coverage Measurement and Analysis (Information Technology: Transmission, Processing and Storage)
Functional Verification Coverage Measurement and Analysis addresses the subject of coverage measurement and analysis, a means of quantitatively assessing functional verification progress. In the absence of this process, design verification engineers (and their management) are left guessing whether or not they have completed...
Solaris 10 System Administration Exam Prep: CX-310-200, Part I (2nd Edition)
Solaris 10 System Administration Exam Prep: CX-310-200, Part I (2nd Edition)
In This Book You’ll Learn How To:
  • Install and configure the Solaris 10 operating environment on SPARC and x86/x64-based platforms
  • Set up, manage, back up, and recover file systems
  • Execute System Boot and Shutdown Procedures for SPARC and x86/x64-based systems
  • Manage services using the...
Introduction to Video Search Engines
Introduction to Video Search Engines
Video search engines enable users to take advantage of constantly growing video resources like, for example, video on demand, Internet television and YouTube, for a wide variety of applications including entertainment, education and communications.

David Gibbon and Zhu Liu describe the current state of video search engine technology and inform...

Java, XML, and the JAXP
Java, XML, and the JAXP
This book is intended to provide a solid foundation in XML to a Java programmer. It does this by describing XML and then using the API developed by Sun Microsystems to demonstrate simple examples of the fundamentals of XML document manipulation. You’ve heard of XML, and you have more than likely read something about it, but it all seems a bit...
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES...
Building Interactive Worlds in 3D: Virtual Sets and Pre-visualization for Games, Film & the Web
Building Interactive Worlds in 3D: Virtual Sets and Pre-visualization for Games, Film & the Web
"Coming at the process of making interactive worlds from a non-gaming viewpoint proves to be a refreshing break...Provided is a version of the Virtools pre-visualisation package, which is used to set up the interaction between objects, cameras and players. And this is where Gauthier comes into his own with paticularly thought-provoking...
Database Solutions: A step by step guide to building databases (2nd Edition)
Database Solutions: A step by step guide to building databases (2nd Edition)
The second edition of this book incorporates two relational database design methodologies to teach readers how databases can be implemented in Microsoft Access and Oracle. Not only does the book provide a comprehensive methodology for relational database design, but the authors also show readers how to use the latest installation of UML. Fifteen...
Result Page: 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy