 |
|
|
|
 |  |  Design Patterns Explained: A New Perspective on Object-Oriented Design"...I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between ... |  |  Computing Information Technology: The Human SideFrom the senior management to the clerical and support group levels, this study addresses the possible pitfalls and triumphs of implementing information technology (IT) into organizations in terms of organizational strategies, structures, and communication methods. Issues of human-computer interaction, ethics, privacy, and security are raised to... |
|
|
 Putting Knowledge Networks into Action: Methodology, Development, MaintenanceThe concepts and theories of knowledge management and networks are about to become well documented. Yet there are few, if any, guidelines on how to implement knowledge management within an organization, especially focusing on how to manage knowledge in a network environment. On the one hand, this is paraphrasing Tom Stewart’s assertion in his... |  |  |  |  Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |
|
|
|
Result Page: 108 107 106 105 104 103 102 101 100 99 |