Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Based Design and Manufacturing (Manufacturing Systems Engineering)
Computer Based Design and Manufacturing (Manufacturing Systems Engineering)
As industry adopts a consumer focus in its product development strategy, it offers broader product ranges, shorter model lifetimes, and the ability to process orders in arbitrary lot sizes. This offers the ability to conduct early product design and development trade-off analysis among these competing objectives. The use of information technologies...
Wireless Data Services: Technologies, Business Models and Global Markets
Wireless Data Services: Technologies, Business Models and Global Markets
"[T]his is a quite readable book with lots of interesting nuggets of information..." Russell J. Haines, Communications Engineer

"This is an excellent book covering all of the current research and development in the wireless industry as well as pointing out what is to come. A recommended book for all academic
...
Strategies for Information Technology and Intellectual Capital
Strategies for Information Technology and Intellectual Capital
"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:...
Component Database Systems (The Morgan Kaufmann Series in Data Management Systems)
Component Database Systems (The Morgan Kaufmann Series in Data Management Systems)
I recently came across a fascinating book, Regional Advantage—Culture and Competition in Silicon Valley and Route 128.1 The author compares the rise and dominance of Silicon Valley during the 1970s and 1980s with the slow decline of Route 128 during the 1980s and hypothesizes that the contrasts in development were mainly due to the large...
A Practical Guide to Planning for E-Business Success:  How to E-enable Your Enterprise
A Practical Guide to Planning for E-Business Success: How to E-enable Your Enterprise
The Internet has had, and will continue to have, a major impact on our lives and businesses. It changes everything. The Internet provides a means to transform entire industries, create new industries, challenge industry leaders, and enable business in entirely new ways. Companies use the Internet to expand their markets, increase revenue,...
Service Oriented Architecture with Java
Service Oriented Architecture with Java
Service Oriented Architecture is mainly a mindset, an enterprise strategy whose natural implementation is represented by web services. SOA is not a single product or single reference architecture to be followed, but SOA is all about best practices, reference architectures, processes, toolsets, and frameworks, along with many other things which will...
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more...
Web-to-Host Connectivity
Web-to-Host Connectivity
Nobody can dispute the incredible impact that the Web continues to have on the way in which people work, shop, research, play, and communicate. In the span of just a few short years, enterprises in nearly every industry and market have had to reevaluate the way in which they do business with their business partners and end customers. Having a...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

MCITP Self-Paced Training Kit (Exam 70-647): Windows Server Enterprise Administration
MCITP Self-Paced Training Kit (Exam 70-647): Windows Server Enterprise Administration
Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-647, a required exam for the new Microsoft® Certified IT Professional (MCITP): Enterprise Administrator certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help assess your skills. It comes...
Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
Result Page: 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy