Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)
Information Systems Strategic Management: An Integrated Approach (Routledge Information Systems Textbooks)

This comprehensive guide to the strategic management of information systems within business and public sector organizations integrates the two, often disparate, domains of strategic management and information systems.  Focusing on managing information systems within a broader organizational context, it covers key issues...

Bioinformatics Basics: Applications in Biological Science and Medicine
Bioinformatics Basics: Applications in Biological Science and Medicine

Scientists in the throes of research use an extensive data bank to access structural information on proteins and nucleic acids. Meanwhile, geneticists use a highly specialized form of software to analyze the hybridization pattern of DNA chips. The past decade has been tremendously successful for biotechnology and pharmaceutical...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Drinking Water and Infectious Disease: Establishing the Links
Drinking Water and Infectious Disease: Establishing the Links

There still exists considerable uncertainty in many countries about the contribution of drinking water to sporadic cases of disease. The Organization for Economic Cooperation and Development (OECD), in cooperation with the World Health Organization (WHO), led the Workshop on Molecular Technologies for Safe Drinking Water in 1998 to address...

Specification by Example: How Successful Teams Deliver the Right Software
Specification by Example: How Successful Teams Deliver the Right Software

The book you hold in your hands, or see on your screen, is the result of a series of studies of how teams all over the world specify, develop, and deliver the right software, without defects, in very short cycles. It presents the collective knowledge of about 50 projects, ranging from public websites to internal back-office systems....

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Digital Asset Management
Digital Asset Management

My interest in this subject started when I joined the broadcast equipment manufacturer, Chyron. For a few years I was the product manager for their playout automation and asset management product lines. These were one of the first applications that gave television broadcasters the means to manage the ingest, storage, archiving, and...

Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011

The 13th IMA Conference on Cryptography and Coding was held at the Lady Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This event was a 25th anniversary celebration of the very successful biennial IMA conference series. Traditionally, the conference has taken place at the Royal Agricultural College,...

Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

Women in Biotechnology: Creating Interfaces
Women in Biotechnology: Creating Interfaces
Biotechnologies, such as genetic engineering, cloning and biodiversity, raise many legal and ethical concerns, so it is important that people understand these issues and feel able to express their opinions. This is why the European Commission has been, for a number of years, supporting actions to improve communication among...
Effectiveness of Air Force Science and Technology Program Changes
Effectiveness of Air Force Science and Technology Program Changes

Under mandate of Section 253, Study and Report on Effectiveness of Air Force Science and Technology Program Changes, of the Fiscal Year 2002 National Defense Authorization Act (Public Law 107-107; U.S. Congress, 2001), the U.S. Air Force contracted with the National Research Council (NRC) to conduct the present study. In response,...

Result Page: 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy