Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The McGraw-Hill 36-Hour Course: Project Management, Second Edition
The McGraw-Hill 36-Hour Course: Project Management, Second Edition

Schedule and coordinate projects seamlessly, start to finish!

In today's ultracompetitive world of business, those in charge want results on time and on budget--and they're turning to project managers to deliver. Skilled project managers are in high demand, and the profession is growing at an unprecedented rate.

...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Applying Design for Six Sigma to Software and Hardware Systems
Applying Design for Six Sigma to Software and Hardware Systems

The Practical, Example-Rich Guide to Building Better Systems, Software, and Hardware with DFSS

Design for Six Sigma (DFSS) offers engineers powerful opportunities to develop more successful systems, software, hardware, and processes. In Applying Design for Six Sigma to Software and Hardware Systems, two
...

Architecture Principles: The Cornerstones of Enterprise Architecture (The Enterprise Engineering Series)
Architecture Principles: The Cornerstones of Enterprise Architecture (The Enterprise Engineering Series)

When enterprise architects try to explain to people who are not enterprise architects what it is they do for a living, they almost invariably resort to using an analogy with the architecture of buildings, and describe enterprise architecture as a ‘kind of blueprint’. While this analogy may be helpful in conveying a general sense...

Air Pollution Modeling and its Application XV (v. 15)
Air Pollution Modeling and its Application XV (v. 15)

This volume contains the papers and poster abstracts presented at the 25th NATO/CCMS International Technical Meeting on Air Pollution Modelling and Its Application held in Louvain-la-Neuve, Belgium, during 15-19 October 2001. This ITM was jointly organized by the University of Aveiro, Portugal (Pilot country) and by the Catholic University of...

Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals
Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals

Risk control, capital allocation, and realistic derivative pricing and hedging are critical concerns for major financial institutions and individual traders alike. Events from the collapse of Lehman Brothers to the Greek sovereign debt crisis demonstrate the urgent and abiding need for statistical tools...

Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict
Asymmetric Warfare in South Asia: The Causes and Consequences of the Kargil Conflict

The 1999 conflict between India and Pakistan near the town of Kargil in contested Kashmir was the first military clash between two nuclear-armed powers since the 1969 Sino-Soviet war. Kargil was a landmark event not because of its duration or casualties, but because it contained a very real risk of nuclear escalation. Until the Kargil...

CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)
All-in-One is All You Need

Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Rapid Psychiatry
Rapid Psychiatry

"Rapid Psychiatry" is the fifth title in the "Rapid" series of short revision notes books, covering key information in a simple and easily accessible format, using a mnemonic to aid recall. This book provides an excellent revision tool in the run-up to exams, but is also useful for clinical students working on their...

MCSE Training Kit: Migrating from Microsoft Windows NT 4.0 to Microsoft Windows 2000
MCSE Training Kit: Migrating from Microsoft Windows NT 4.0 to Microsoft Windows 2000

Welcome to MCSE Training Kit—Migrating from Microsoft Windows NT 4.0 to Microsoft Windows 2000. This kit introduces you to the concepts and practices involved in migrating from Microsoft Windows NT to Microsoft Windows 2000. You will learn how to plan, manage, and perform the process of migration and design a fallback plan...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy