Home | Amazing | Today | Tags | Publishers | Years | Search 
Techniques and Tools for the Design and Implementation of Enterprise Information Systems
Techniques and Tools for the Design and Implementation of Enterprise Information Systems
Inter-organizational information systems play a major role in improving communication and integration between partnering firms to achieve an integrated global supply chain. Current research in enterprise resource planning and electronic commerce is crucial to maintaining efficient supply chain management and organizational competitiveness....
Remote Sensing: The Image Chain Approach
Remote Sensing: The Image Chain Approach
Remote Sensing deals with the fundamental ideas underlying the rapidly growing field of remote sensing. John Schott explores energy-matter interaction, radiation propagation, data dissemination, and described the tools and procedures required to extract information from remotely sensed data using the image chain approach. Organizations and...
Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP is the premier forum in Europe for bringing together practitioners, researchers, and students to share their ideas and experiences in a broad range of disciplines woven with the common thread of object technology. It is a collage of events, including outstanding invited speakers, carefully refereed technical papers, practitioner reports...
Electronic Commerce: Theory and Practice (Studies in Computational Intelligence)
Electronic Commerce: Theory and Practice (Studies in Computational Intelligence)
Electronic Commerce technologies have been studied widely in the field of Economics and Informatics. In recent years, there are multiple aspects of researches in electronic commerce including supply chain model, Internet auctions, Internet volume discounts, electronic bank and stock trading, and several others. The increase of Electronic Commerce...
QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types (QuickTime Developer Series)
QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types (QuickTime Developer Series)
"Buried inside QuickTime are a host of powerful tools for creating, delivering, and playing digital media. The official QuickTime documentation explains 'what' each API function does. But knowing what each function does isn't enough to allow a developer to take full advantage of QuickTime. QuickTime Toolkit fills in the...
Data Communications and Computer Networks: For Computer Scientists and Engineers
Data Communications and Computer Networks: For Computer Scientists and Engineers
A broad introductory text written for computer scientists and engineers, focusing on the fundamental aspects of data communications and computer networks. This second edition has been thoroughly revised to cover current networking issues and technologies. Specific updates include those on networks and their management, transmission technologies,...
Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
Today's embedded and real-time systems contain a mix of processor types: off-the-shelf microcontrollers, digital signal processors (DSPs), and custom processors. The decreasing cost of DSPs has made these sophisticated chips very attractive for a number of embedded and real-time applications, including automotive, telecommunications, medical...
Artificial Intelligence for Games (The Morgan Kaufmann Series in Interactive 3D Technology)
Artificial Intelligence for Games (The Morgan Kaufmann Series in Interactive 3D Technology)
"This is the first serious attempt to create a comprehensive reference for all game AI practices, terminology, and know-how. Works like this are badly needed by the maturing video games industry. Systematic yet accessible, it is a must-have for any student or professional." -Marcin Chady, Ph.D., Radical Entertainment

...
Functions of a Complex Variable: Theory and Technique (Classics in Applied Mathematics)
Functions of a Complex Variable: Theory and Technique (Classics in Applied Mathematics)
In addition to being a rewarding branch of mathematics in its own right, the theory of functions of a complex variable underlies a large number of enormously powerful techniques which find their application not only in other branches of mathematics but also in the sciences and in engineering. Chapters 1, 2, and 5 of this book provide concisely but...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Result Page: 413 412 411 410 409 408 407 406 405 404 403 402 401 400 399 398 397 396 395 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy